Login / Signup
Human-centered authentication guidelines.
Jeremiah D. Still
Ashley A. Cain
David Schuster
Published in:
Inf. Comput. Secur. (2017)
Keyphrases
</>
human centered
ambient intelligence
human centric
biometric authentication
human robot interaction
multimedia databases
user authentication
neural network
image authentication
authentication mechanism
data sets
data mining
video sequences
multi agent systems
security analysis
authentication protocol