Login / Signup
Four Factor Authentication with emerging cybersecurity for Mobile Transactions.
Sanyam Jain
Raju gautam
Shivani Sharma
Ravi Tomar
Published in:
CoRR (2023)
Keyphrases
</>
factor authentication
mobile terminals
database
data mining
mobile devices
feature extraction
smart card
context aware
authentication systems
mobile users
mobile computing
trusted computing