Bassant M. El-Den

  • Citations Per Year
Learn More
Information security and verify the user's identity has become one of the biggest concerns of institutions and individuals; this interest emerged many types of authentication. Security field uses three different ways; in the oldest documentation of these methods depending on the specific information such as a password or name. The second type depends(More)
  • 1