Login / Signup

Attacks and defenses in user authentication systems: A survey.

Xuerui WangZheng YanRui ZhangPeng Zhang
Published in: J. Netw. Comput. Appl. (2021)
Keyphrases
  • user authentication
  • authentication scheme
  • distributed systems
  • computer systems
  • data mining
  • data distribution
  • security systems