J Brainard,
A Juels,
RL Rivest, M Szydlo… - Proceedings of the 13th …, 2006 - dl.acm.org
User authentication in computing systems traditionally depends on three factors: something
you have (eg, a hardware token), something you are (eg, a fingerprint), and something you …