Login / Signup

Authentication without Identification.

Anna Lysyanskaya
Published in: IEEE Secur. Priv. (2007)
Keyphrases
  • automatic identification
  • neural network
  • information sharing
  • real time
  • information retrieval
  • authentication scheme