Sign in

Authentication schemes for smart mobile devices: threat models, countermeasures, and open research issues.

Mohamed Amine FerragLeandros A. MaglarasAbdelouahid DerhabHelge Janicke
Published in: Telecommun. Syst. (2020)
Keyphrases
  • countermeasures
  • information security
  • databases
  • probabilistic model
  • machine learning
  • data analysis
  • rural areas
  • security measures