Login / Signup
Widely Reused and Shared, Infrequently Updated, and Sometimes Inherited: A Holistic View of PIN Authentication in Digital Lives and Beyond.
Hassan Khan
Jason Ceci
Jonah Stegman
Adam J. Aviv
Rozita Dara
Ravi Kuber
Published in:
ACSAC (2020)
Keyphrases
</>
neural network
digital media
security analysis
databases
digital content
real time
data sets
authentication scheme
biometric authentication
identity authentication
public key infrastructure
virtual private network