Login / Signup

Transparent authentication scheme with adaptive biometrie features for IoT networks.

Kuo-Hui YehChunhua SuChien-Lung HsuWayne ChiuYu-Fan Hsueh
Published in: GCCE (2016)
Keyphrases
  • authentication scheme
  • feature set
  • feature extraction
  • feature vectors
  • similarity measure
  • computer networks
  • feature space
  • routing protocol
  • conflict resolution