Login / Signup
The Threat of Deep Fake Technology to Trusted Identity Management.
Atif Ali
Yasir Khan Jadoon
Zulqarnain Farid
Munir Ahmad
Naseem Abidi
Haitham M. Alzoubi
Ali A. Alzoubi
Published in:
ICCR (2022)
Keyphrases
</>
identity management
trust relationships
personal information
case study
access control
cost effective
data processing
database
machine learning
high level
data collection
distributed environment
countermeasures
user centric
information society