Login / Signup

Acceptance of Subscriber Authentication Methods For Mobile Telephony Devices.

Nathan L. ClarkeSteven FurnellP. M. RodwellPaul L. Reynolds
Published in: Comput. Secur. (2002)
Keyphrases
  • mobile devices
  • computational cost
  • empirical studies
  • preprocessing
  • significant improvement
  • benchmark datasets
  • learning algorithm
  • social networks
  • mobile phone
  • machine learning methods