Login / Signup

A Proxy Signature-Based Drone Authentication in 5G D2D Networks.

Mai A. Abdel-MalekKemal AkkayaArupjyoti BhuyanAhmed S. Ibrahim
Published in: VTC Spring (2021)
Keyphrases
  • biometric authentication
  • social networks
  • computer networks
  • image registration
  • user authentication
  • computer vision
  • pose estimation
  • complex networks
  • network analysis
  • security analysis
  • identity authentication