Login / Signup

Differentiating User Authentication Graphs.

Alexander D. KentLorie M. Liebrock
Published in: IEEE Symposium on Security and Privacy Workshops (2013)
Keyphrases
  • user authentication
  • authentication scheme
  • keystroke dynamics
  • security analysis
  • biometric authentication
  • authentication protocol
  • information security
  • image features
  • secret key