Login / Signup
Anti-Phishing Strong Authentication Technology Options.
Paul D. Witman
Published in:
AMCIS (2006)
Keyphrases
</>
anti phishing
data encryption
rapid development
data processing
cost effective
databases
case study
security requirements
data mining
computer systems
information security
user authentication
authentication scheme