Keyboard Data Protection Technique Using GAN in Password-Based User Authentication: Based on C/D Bit Vulnerability.
Jaehyuk LeeWonbin JeongKyungroul LeePublished in: Sensors (2024)
Keyphrases
- user authentication
- data protection
- information security
- authentication scheme
- access control
- data security
- network security
- sensitive information
- security issues
- personal data
- intrusion detection
- e government
- smart card
- authentication protocol
- sensitive data
- privacy protection
- information systems
- security analysis
- security requirements
- biometric systems
- data privacy
- data integrity
- database design
- database systems