Article,

Authentication systems: principles and threats.

, , and .
Computer and Information Science, 8 (3): 155-179 (2015)

Meta data

Tags

Users

  • @dblp

Comments and Reviews