Towards narrative authentication: or, against boring authentication.
Anil SomayajiDavid MouldCarson BrownPublished in: NSPW (2013)
Keyphrases
- image authentication
- biometric authentication
- digital watermarking
- authentication scheme
- identity authentication
- data sets
- security requirements
- security mechanisms
- authentication protocol
- user authentication
- integrity verification
- real time
- neural network
- encryption decryption
- authentication mechanism
- factor authentication