The Pros and Cons of Different Ways to Authenticate Users

Publication details

  • Event: Trial Lecture, Dept. of Informatics, University of Oslo
  • Year: 2005