Login / Signup

Vulnerability analysis on the image-based authentication: Through the WM_INPUT message.

Kyungroul LeeKangbin YimSun-Young Lee
Published in: Concurr. Comput. Pract. Exp. (2020)
Keyphrases
  • email
  • database
  • computer vision
  • security requirements
  • identity management
  • factor authentication