Login / Signup
Forgery Resistance of User Authentication Methods Using Location, Wi-Fi and Their Correlation.
Ryosuke Kobayashi
Rie Shigetomi Yamaguchi
Published in:
ICISSP (2024)
Keyphrases
</>
data mining techniques
user authentication
end to end
network architecture
location information
security analysis