Login / Signup
Attacks and defenses in user authentication systems: A survey.
Xuerui Wang
Zheng Yan
Rui Zhang
Peng Zhang
Published in:
J. Netw. Comput. Appl. (2021)
Keyphrases
</>
user authentication
authentication scheme
distributed systems
computer systems
data mining
data distribution
security systems