Login / Signup
Authentication with Mildly Myopic Adversaries.
Allison Beemer
Eric Graves
Jörg Kliewer
Oliver Kosut
Paul L. Yu
Published in:
ISIT (2020)
Keyphrases
</>
bounded rationality
user authentication
biometric authentication
identity authentication
information retrieval
learning algorithm
information gain
brute force
fragile watermarking
multi agent
digital images
security mechanisms
authentication protocol
image authentication
identity management