Login / Signup

A study of privacy problem solving using device and user authentication for M2M environments.

Jin-Mook KimHwa-Young JeongBong-Hwa Hong
Published in: Secur. Commun. Networks (2014)
Keyphrases
  • user authentication
  • privacy preserving
  • data mining
  • information systems