Abstract: Knowledge-based authentication techniques remain one of the proven ways of maintaining confidentiality, ensuring integrity, and guaranteeing the availability of an information system. They ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results