4   Artículos

 
en línea
Yajie Wang, Xiaomei Zhang and Haomin Hu    
Recent developments in the mobile and intelligence industry have led to an explosion in the use of multiple smart devices such as smartphones, tablets, smart bracelets, etc. To achieve lasting security after initial authentication, many studies have been... ver más
Revista: Information    Formato: Electrónico

 
en línea
Sultan Almalki, Nasser Assery and Kaushik Roy    
While the password-based authentication used in social networks, e-mail, e-commerce, and online banking is vulnerable to hackings, biometric-based continuous authentication systems have been used successfully to handle the rise in unauthorized accesses. ... ver más
Revista: Applied Sciences    Formato: Electrónico

« Anterior     Página: 1 de 1     Siguiente »