Login / Signup
Evaluating Web-Based User Authentication using Graphical Techniques.
Mohd Zalisham Jali
Steven Furnell
Paul Dowland
Published in:
HAISA (2009)
Keyphrases
</>
user authentication
authentication scheme
biometric authentication
keystroke dynamics
security analysis
information security
biometric systems
authentication systems
authentication protocol
real time
medical images
data access
resource constrained
remote user authentication scheme