Login / Signup
Authentication and Naming (Transcript of Discussion).
Michael Roe
Published in:
Security Protocols Workshop (2000)
Keyphrases
</>
user authentication
social networks
identity authentication
fragile watermarking
database
artificial intelligence
peer to peer
security mechanisms
subject matter
word recognition
biometric authentication
data encryption