Login / Signup
TwoKind authentication: usable authenticators for untrustworthy environments.
Katelin Bailey
Linden Vongsathorn
Apu Kapadia
Chris Masone
Sean W. Smith
Published in:
SOUPS (2007)
Keyphrases
</>
dynamic environments
robotic systems
learning algorithm
biometric authentication
neural network
artificial intelligence
information systems
website
expert systems
digital images
low cost
security mechanisms
public key cryptography
authentication mechanism