C
search
search
reviewers
reviewers
feeds
feeds
assignments
assignments
settings
logout
Saccadic trajectory-based identity authentication.
Huiru Shao
Jing Li
Wenbo Wan
Huaxiang Zhang
Jiande Sun
Published in:
Multim. Tools Appl. (2020)
Keyphrases
</>
identity authentication
mobile commerce
network security
data protection
databases
mobile devices
electronic commerce