Login / Signup
Using Dropped Call as an Authentication Factor.
Balwinder Sodhi
Published in:
CIT/IUCC/DASC/PICom (2015)
Keyphrases
</>
data sets
decision trees
digital libraries
biometric authentication
factor analysis
user authentication
authentication scheme
identity authentication