Login / Signup
An overview of continuous device-to-device authentication techniques for the internet of things.
Arwa Badhib
Asma Cherif
Suhair Alshehri
Published in:
Int. J. Ad Hoc Ubiquitous Comput. (2021)
Keyphrases
</>
database
portable devices
information systems
ubiquitous computing