Login / Signup
Vulnerability analysis on the image-based authentication: Through the WM_INPUT message.
Kyungroul Lee
Kangbin Yim
Sun-Young Lee
Published in:
Concurr. Comput. Pract. Exp. (2020)
Keyphrases
</>
email
database
computer vision
security requirements
identity management
factor authentication