Login / Signup

A comparison of three authentication properties.

Riccardo FocardiRoberto GorrieriFabio Martinelli
Published in: Theor. Comput. Sci. (2003)
Keyphrases
  • information retrieval
  • real time
  • neural network
  • computer vision
  • feature extraction
  • data structure
  • identity authentication
  • data encryption