Login / Signup

An overview of continuous device-to-device authentication techniques for the internet of things.

Arwa BadhibAsma CherifSuhair Alshehri
Published in: Int. J. Ad Hoc Ubiquitous Comput. (2021)
Keyphrases
  • database
  • portable devices
  • information systems
  • ubiquitous computing