Sign Up to like & get
recommendations!
0
Published in 2021 at "IEEE Access"
DOI: 10.1109/access.2021.3110310
Abstract: By and large, authentication systems employed for web-based applications primarily utilize conventional username and password-based schemes, which can be compromised easily. Currently, there is an evolution of various complex user authentication schemes based on the…
read more here.
Keywords:
secure user;
user authentication;
authentication;
authentication process ... See more keywords