Login / Signup
Threat Modelling in User Performed Authentication.
Xun Dong
John A. Clark
Jeremy L. Jacob
Published in:
ICICS (2008)
Keyphrases
</>
user authentication
user interface
relevance feedback
user defined
user requirements
keystroke dynamics
data sets
image retrieval
recommender systems
digital images
collaborative filtering
user satisfaction
user feedback
user interests
information overload
user input