On designing an unaided authentication service with threat detection and leakage control for defeating opportunistic adversaries
Crossref DOI link: https://doi.org/10.1007/s11704-019-9134-9
Published Online: 2020-10-02
Published Print: 2021-04
Update policy: https://doi.org/10.1007/springer_crossmark_policy
Chakraborty, Nilesh
Mondal, Samrat
Text and Data Mining valid from 2020-10-02
Version of Record valid from 2020-10-02
Article History
Received: 17 April 2019
Accepted: 17 December 2019
First Online: 2 October 2020