Login / Signup
Parasitic Authentication To Protect Your E-Wallet.
Tim Ebringer
Peter Thorne
Yuliang Zheng
Published in:
Computer (2000)
Keyphrases
</>
biometric authentication
security analysis
image authentication
user authentication
identity authentication
artificial intelligence
data encryption
data sets
databases
key distribution
authentication scheme
identity management
factor authentication
semi fragile watermarking