K Niinuma, U Park, AK Jain - IEEE Transactions on Information Forensics …, 2010 - infona.pl
Most existing computer and network systems authenticate a user only at the initial login
session. This could be a critical security weakness, especially for high-security systems …