Login / Signup
-Times Anonymous Authentication.
Isamu Teranishi
Jun Furukawa
Kazue Sako
Published in:
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. (2009)
Keyphrases
</>
trusted platform module
biometric authentication
orders of magnitude
user authentication
real time
peer to peer
authentication protocol
neural network
genetic algorithm
website
feature extraction
electronic commerce
wireless networks
security analysis
authentication scheme