Login / Signup
Identifying computer users with authentication devices (tokens).
J.-C. Spender
Published in:
Comput. Secur. (1987)
Keyphrases
</>
computer users
database
neural network
mobile devices
smart phones
authentication mechanism
session initiation protocol
integrity verification
semi fragile watermarking