KK Greene, F Tamborello - Proceedings of the …, 2015 - iccm-conference.neocities.org
As we increasingly rely upon our computer information systems to store and operate on
sensitive information, the methods we use to authenticate user identity also become more …