Login / Signup

An inconvenient truth about tunneled authentications.

Katrin HoeperLidong Chen
Published in: LCN (2010)
Keyphrases
  • authentication protocol
  • truth values
  • genetic algorithm
  • computer vision
  • metadata
  • web services
  • search space
  • fuzzy logic