Sciweavers

Security through a different kind of obscurity: evaluating distortion in graphical authentication schemes
Recent Google, Yahoo, MSN search queries leading to this post
Security through a different kind of obscurity: evaluating distortion in graphical authentication schemes
Data is not available yet.