Login / Signup
Passwords and the evolution of imperfect authentication.
Joseph Bonneau
Cormac Herley
Paul C. van Oorschot
Frank Stajano
Published in:
Commun. ACM (2015)
Keyphrases
</>
user authentication
authentication systems
authentication scheme
biometric authentication
graphical password
image authentication
biometric recognition
software evolution
authentication protocol
evolution process
information retrieval
evolutionary algorithm
artificial life
identity management
data encryption