Sign in

Phoney: protecting password hashes with threshold cryptology and honeywords.

Rong WangHao ChenJianhua Sun
Published in: Int. J. Embed. Syst. (2016)
Keyphrases
  • random projections
  • information security
  • access control
  • threshold selection
  • feature selection
  • data structure
  • intrusion detection