Login / Signup
Comments on yet another log-in authentication using n-dimensional construction.
Shuhong Wang
Feng Bao
Jie Wang
Published in:
IEEE Trans. Consumer Electron. (2004)
Keyphrases
</>
database
neural network
identity authentication
data sets
real world
machine learning
social networks
expert systems
digital images
lightweight
authentication scheme
identity management