Login / Signup
Alternative Authentication in the Wild.
Joseph Maguire
Karen Renaud
Published in:
CoRR (2016)
Keyphrases
</>
identity authentication
databases
artificial intelligence
multiresolution
authentication protocol
user authentication
authentication mechanism
factor authentication