Login / Signup
Saccadic trajectory-based identity authentication.
Huiru Shao
Jing Li
Wenbo Wan
Huaxiang Zhang
Jiande Sun
Published in:
Multim. Tools Appl. (2020)
Keyphrases
</>
identity authentication
mobile commerce
network security
data protection
databases
mobile devices
electronic commerce