Linked e-resources

Details

Introduction
Background
Sketch-Based Authentication
Efficiency, Uniqueness, and Robustness
Human-Computer Interaction
Experiments and Results
Conclusions
Appendix: Optimization
Appendix: Subspace Approximations.

Browse Subjects

Show more subjects...

Statistics

from
to
Export