Login / Signup

Forgery Resistance of User Authentication Methods Using Location, Wi-Fi and Their Correlation.

Ryosuke KobayashiRie Shigetomi Yamaguchi
Published in: ICISSP (2024)
Keyphrases
  • data mining techniques
  • user authentication
  • end to end
  • network architecture
  • location information
  • security analysis