Linked e-resources
Details
Table of Contents
Introduction
Background
Sketch-Based Authentication
Efficiency, Uniqueness, and Robustness
Human-Computer Interaction
Experiments and Results
Conclusions
Appendix: Optimization
Appendix: Subspace Approximations.
Background
Sketch-Based Authentication
Efficiency, Uniqueness, and Robustness
Human-Computer Interaction
Experiments and Results
Conclusions
Appendix: Optimization
Appendix: Subspace Approximations.