Login / Signup
Differentiating User Authentication Graphs.
Alexander D. Kent
Lorie M. Liebrock
James Wernicke
Published in:
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. (2014)
Keyphrases
</>
user authentication
authentication scheme
security analysis
keystroke dynamics
biometric authentication
information security
authentication protocol
biometric systems
remote user authentication scheme
similarity measure
high resolution
low cost