Login / Signup
Panel Introduction: Varieties of Authentication.
Roberto Gorrieri
Paul F. Syverson
Martín Abadi
Riccardo Focardi
Dieter Gollmann
Gavin Lowe
Catherine A. Meadows
Published in:
CSFW (1998)
Keyphrases
</>
biometric authentication
security mechanisms
data sets
user authentication
identity authentication
databases
genetic algorithm
social networks
multi agent
security analysis
authentication protocol
encryption decryption