Which authentication method to choose. A legal perspective on user-device authentication in IoT ecosystems.
Cristina Timón LópezIgnacio Alamillo DomingoJulián Valero TorrijosPublished in: ARES (2021)
Keyphrases
- high precision
- pairwise
- biometric authentication
- user authentication
- high accuracy
- computational cost
- experimental evaluation
- classification method
- detection method
- clustering method
- probabilistic model
- significant improvement
- computational complexity
- similarity measure
- security analysis
- fragile watermarking
- information retrieval
- segmentation method
- synthetic data
- management system
- user interface
- preprocessing
- video sequences