Login / Signup

Usable security of authentication process: New approach and practical assessment.

Maha M. AlthobaitiPam J. Mayhew
Published in: ICITST (2015)
Keyphrases
  • real world
  • user authentication
  • access control
  • security policies
  • biometric systems
  • identity management
  • wireless local area network