Login / Signup

An efficient two-factor authentication scheme based on negative databases: Experiments and extensions.

Ran LiuXiang WangCan Wang
Published in: Appl. Soft Comput. (2022)
Keyphrases