Login / Signup
A study of privacy problem solving using device and user authentication for M2M environments.
Jin-Mook Kim
Hwa-Young Jeong
Bong-Hwa Hong
Published in:
Secur. Commun. Networks (2014)
Keyphrases
</>
user authentication
privacy preserving
data mining
information systems