S Hoque, M Fairhurst,
G Howells - 2008 Bio-inspired, Learning …, 2008 - ieeexplore.ieee.org
In traditional cryptosystems, user authentication is based on the possession of secret
keys/tokens. Such keys can be forgotten, lost, stolen, or may be illegally shared, but an …