Login / Signup

Database authentication revisited.

Thomas HardjonoYuliang ZhengJennifer Seberry
Published in: Comput. Secur. (1994)
Keyphrases