[2k blog in Computer Science] VLAM authentication method

Reading Time: < 1 minute Human authentication to computer systems is problematic in many ways. There are aspects conserning the user’s ability to memorize arbitrary character-number -combinations as well as extraneous equipment which should be added to the system if other than password-based authentication methods were to be used (biometrics). The method proposed in this paper is based on theContinue reading “[2k blog in Computer Science] VLAM authentication method”