Login / Signup
A comparison of three authentication properties.
Riccardo Focardi
Roberto Gorrieri
Fabio Martinelli
Published in:
Theor. Comput. Sci. (2003)
Keyphrases
</>
information retrieval
real time
neural network
computer vision
feature extraction
data structure
identity authentication
data encryption