Login / Signup
Mobile authentication of copy detection patterns.
Olga Taran
Joakim Tutt
Taras Holotyak
Roman Chaban
Slavi Bonev
Slava Voloshynovskiy
Published in:
CoRR (2022)
Keyphrases
</>
copy detection
mobile devices
smart phones
data mining techniques
mobile phone
mobile applications
mobile environments
pattern mining
website
context aware
security analysis
authentication protocol
user authentication
similar patterns
data encryption
authentication mechanism