Doodling our way to better authentication.
Joseph GoldbergJennifer HagmanVibha SazawalPublished in: CHI Extended Abstracts (2002)
Keyphrases
- biometric authentication
- authentication scheme
- identity authentication
- authentication protocol
- fragile watermarking
- data encryption
- user authentication
- databases
- image authentication
- digital watermarking
- identity management
- real time
- semi fragile watermarking
- security analysis
- security services
- security requirements
- operating system