Login / Signup
Usable security of authentication process: New approach and practical assessment.
Maha M. Althobaiti
Pam J. Mayhew
Published in:
ICITST (2015)
Keyphrases
</>
real world
user authentication
access control
security policies
biometric systems
identity management
wireless local area network