Login / Signup

Identifying computer users with authentication devices (tokens).

J.-C. Spender
Published in: Comput. Secur. (1987)
Keyphrases
  • computer users
  • database
  • neural network
  • mobile devices
  • smart phones
  • authentication mechanism
  • session initiation protocol
  • integrity verification
  • semi fragile watermarking