Login / Signup
Differentiating User Authentication Graphs.
Alexander D. Kent
Lorie M. Liebrock
Published in:
IEEE Symposium on Security and Privacy Workshops (2013)
Keyphrases
</>
user authentication
authentication scheme
keystroke dynamics
security analysis
biometric authentication
authentication protocol
information security
image features
secret key