Login / Signup
Man-in-the-Middle Attack on the Authentication of the User from the Remote Autonomous Object.
Cheng-Ying Yang
Cheng-Chi Lee
Shu-Yin Hsiao
Published in:
Int. J. Netw. Secur. (2005)
Keyphrases
</>
real time
user interaction
recommender systems
user authentication
cooperative
end users
biometric authentication
object tracking
user model
target object
object model
physical location
object segmentation
user satisfaction
partial occlusion
user profiles
relevance feedback
website