Login / Signup

Using Dropped Call as an Authentication Factor.

Balwinder Sodhi
Published in: CIT/IUCC/DASC/PICom (2015)
Keyphrases
  • data sets
  • decision trees
  • digital libraries
  • biometric authentication
  • factor analysis
  • user authentication
  • authentication scheme
  • identity authentication