Login / Signup

Comparing random signals with application to wireless user authentication.

Jitendra K. Tugnait
Published in: ACSCC (2011)
Keyphrases
  • user authentication
  • wireless networks