Login / Signup

Using Physical Context-Based Authentication against External Attacks: Models and Protocols.

Wilson S. MeloRaphael C. S. MachadoLuiz Fernando Rust da Costa Carmo
Published in: Secur. Commun. Networks (2018)
Keyphrases
  • neural network
  • real world
  • probabilistic model
  • security mechanisms
  • security protocols
  • authentication protocol
  • physical models