Login / Signup
An experimental comparison of secret-based user authentication technologies.
I. Irakleous
Steven Furnell
Paul Dowland
Maria Papadaki
Published in:
Inf. Manag. Comput. Secur. (2002)
Keyphrases
</>
user authentication
authentication scheme
keystroke dynamics
security analysis
biometric authentication
information security
data mining
remote user authentication scheme
authentication protocol
biometric systems
secret key
real time
smart card
lightweight
feature extraction
face recognition
databases