Login / Signup
Constructing secure and memorable passwords.
Joakim Kävrestad
Markus Lennartsson
Marcus Birath
Marcus Nohlberg
Published in:
Inf. Comput. Secur. (2020)
Keyphrases
</>
user authentication
sensitive data
security requirements
security analysis
authentication scheme
learning algorithm
artificial intelligence
lightweight
security issues
covert channel
database systems
information processing
security mechanisms
key management
crowd sourcing
authentication systems