Application of perceptual features for user authentication in distributed systems

1Citations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

This paper will present selected approaches based on cognitive solutions for creation security procedures and cryptographic protocols. In particular will be described the ways of using perceptual and cognitive features in creation of secure protocols, oriented on user authentication and data management. The new areas of cognitive cryptography will be also described, which offer a new possibilities in security areas oriented on application of perceptual features and personal characteristics.

Cite

CITATION STYLE

APA

Ogiela, M. R., & Ogiela, L. (2020). Application of perceptual features for user authentication in distributed systems. In Advances in Intelligent Systems and Computing (Vol. 1036, pp. 132–136). Springer Verlag. https://doi.org/10.1007/978-3-030-29029-0_12

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free