Login / Signup

A comparative study of secure device pairing methods.

Arun KumarNitesh SaxenaGene TsudikErsin Uzun
Published in: Pervasive Mob. Comput. (2009)
Keyphrases
  • real time
  • computational cost
  • decision trees
  • preprocessing
  • cross validation
  • database
  • social networks
  • feature selection
  • multiscale
  • pairwise
  • significant improvement
  • low cost
  • benchmark datasets
  • search methods