Login / Signup
Methods for Protecting Password Transmission.
Mohammad Peyravian
Nevenko Zunic
Published in:
Comput. Secur. (2000)
Keyphrases
</>
significant improvement
case study
search methods
database
knowledge base
bayesian networks
preprocessing
artificial neural networks
data mining techniques
empirical studies
benchmark datasets
qualitative and quantitative