"An experimental comparison of secret-based user authentication technologies."

I. Irakleous et al. (2002)

Details and statistics

DOI: 10.1108/09685220210431854

access: closed

type: Journal Article

metadata version: 2023-08-28

a service of  Schloss Dagstuhl - Leibniz Center for Informatics