• search
    search
  • reviewers
    reviewers
  • feeds
    feeds
  • assignments
    assignments
  • settings
  • logout

Saccadic trajectory-based identity authentication.

Huiru ShaoJing LiWenbo WanHuaxiang ZhangJiande Sun
Published in: Multim. Tools Appl. (2020)
Keyphrases
  • identity authentication
  • mobile commerce
  • network security
  • data protection
  • databases
  • mobile devices
  • electronic commerce