Login / Signup
A comparative study of secure device pairing methods.
Arun Kumar
Nitesh Saxena
Gene Tsudik
Ersin Uzun
Published in:
Pervasive Mob. Comput. (2009)
Keyphrases
</>
real time
computational cost
decision trees
preprocessing
cross validation
database
social networks
feature selection
multiscale
pairwise
significant improvement
low cost
benchmark datasets
search methods