Login / Signup
A strong smartphone authentication model to control cellular network access using blockchain.
Shikah J. Alsunaidi
Abdullah Mohammed Almuhaideb
Published in:
Wirel. Networks (2021)
Keyphrases
</>
databases
anomaly detection
operating system