Login / Signup

Decoy Password Vaults: At Least as Hard as Steganography?

Cecilia PasquiniPascal SchöttleRainer Böhme
Published in: SEC (2017)
Keyphrases
  • information security
  • hidden information
  • information hiding
  • spread spectrum
  • data hiding
  • user authentication
  • learning algorithm
  • authentication scheme