Login / Signup

Saccadic trajectory-based identity authentication.

Huiru ShaoJing LiWenbo WanHuaxiang ZhangJiande Sun
Published in: Multim. Tools Appl. (2020)
Keyphrases
  • identity authentication
  • mobile commerce
  • network security
  • data protection
  • databases
  • mobile devices
  • electronic commerce