Login / Signup

A strong smartphone authentication model to control cellular network access using blockchain.

Shikah J. AlsunaidiAbdullah Mohammed Almuhaideb
Published in: Wirel. Networks (2021)
Keyphrases
  • databases
  • anomaly detection
  • operating system