Login / Signup
The Combinatorics of Perfect Authentication Schemes.
Chris J. Mitchell
Michael Walker
Peter R. Wild
Published in:
SIAM J. Discret. Math. (1994)
Keyphrases
</>
neural network
graph theory
identity authentication
key agreement
real time
security properties
image authentication
graphical password
authentication mechanism
security mechanisms
security analysis
user authentication