Login / Signup

Conceivable security risks and authentication techniques for smart devices: A comparative evaluation of security practices.

Syeda Mariam MuzammalMunam Ali ShahSijing ZhangHongji Yang
Published in: Int. J. Autom. Comput. (2016)
Keyphrases