Login / Signup
VOLERE: Leakage Resilient User Authentication Based on Personal Voice Challenges.
Rui Zhang
Zheng Yan
Xuerui Wang
Robert H. Deng
Published in:
IEEE Trans. Dependable Secur. Comput. (2023)
Keyphrases
</>
user authentication
authentication scheme
security analysis
authentication protocol
keystroke dynamics
biometric authentication
remote user authentication scheme
multiresolution
feature selection
face recognition
operating system