Login / Signup
An inconvenient truth about tunneled authentications.
Katrin Hoeper
Lidong Chen
Published in:
LCN (2010)
Keyphrases
</>
authentication protocol
truth values
genetic algorithm
computer vision
metadata
web services
search space
fuzzy logic