Login / Signup
Selecting Secure Passwords.
Eric R. Verheul
Published in:
CT-RSA (2007)
Keyphrases
</>
user authentication
sensitive data
authentication scheme
security requirements
information security
neural network
selection algorithm
authentication protocol
database
authentication systems
covert channel
key distribution
key management
hash functions
lightweight
data sets
real time