Login / Signup
A long-term trial of alternative user authentication technologies.
Steven Furnell
I. Papadopoulos
Paul Dowland
Published in:
Inf. Manag. Comput. Secur. (2004)
Keyphrases
</>
user authentication
long term
authentication scheme
security analysis
information security
keystroke dynamics
authentication protocol
biometric authentication
remote user authentication scheme
biometric systems
real time
databases
data mining
information systems
image processing
feature extraction