Login / Signup
Memorable and Secure: How Do You Choose Your PIN?.
Andreas Gutmann
Melanie Volkamer
Karen Renaud
Published in:
HAISA (2016)
Keyphrases
</>
security requirements
standard model
covert channel
diffie hellman
human memory
security issues
data sets
security analysis
key exchange protocol
secure communication
security management
security protocols
highly efficient
information processing
lightweight
social networks
neural network
databases