Login / Signup
A Performance Analysis of Authentication Using Covert Timing Channels.
Reed Newman
Raheem A. Beyah
Published in:
Networking (2008)
Keyphrases
</>
multi channel
user authentication
information flow
neural network
security analysis
authentication protocol
identity authentication
biometric authentication
network analysis
security mechanisms
virtual private network
data sets
lightweight
authentication mechanism
fragile watermarking
semi fragile watermarking