Login / Signup
A Proxy Signature-Based Drone Authentication in 5G D2D Networks.
Mai A. Abdel-Malek
Kemal Akkaya
Arupjyoti Bhuyan
Ahmed S. Ibrahim
Published in:
VTC Spring (2021)
Keyphrases
</>
biometric authentication
social networks
computer networks
image registration
user authentication
computer vision
pose estimation
complex networks
network analysis
security analysis
identity authentication