Login / Signup
Phoney: protecting password hashes with threshold cryptology and honeywords.
Rong Wang
Hao Chen
Jianhua Sun
Published in:
Int. J. Embed. Syst. (2016)
Keyphrases
</>
random projections
information security
access control
threshold selection
feature selection
data structure
intrusion detection