Login / Signup
Trends, Opportunities, and Challenges in Using Restricted Device Authentication in Fog Computing.
Wesley dos Reis Bezerra
Carlos Becker Westphall
Published in:
CoRR (2022)
Keyphrases
</>
lessons learned
information systems
single image
image authentication
trend detection
database
neural network
real world
learning algorithm
case study
technical challenges
biometric authentication
virtual private network
fragile watermarking