Login / Signup
User Authentication on Earable Devices via Bone-Conducted Occlusion Sounds.
Yadong Xie
Fan Li
Yue Wu
Yu Wang
Published in:
IEEE Trans. Dependable Secur. Comput. (2024)
Keyphrases
</>
user authentication
authentication scheme
keystroke dynamics
information security
security analysis
biometric authentication
embedded systems
remote user authentication scheme
authentication protocol
similarity measure
sensor networks
data mining techniques