Cargando…
Continuous Authentication against Collusion Attacks †
As mobile devices become more and more popular, users gain many conveniences. It has also made smartphone makers install new software and prebuilt hardware on their products, including many kinds of sensors. With improved storage and computing power, users also become accustomed to storing and inter...
Autores principales: | Lyu, Pin, Cai, Wandong, Wang, Yao |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9269356/ https://www.ncbi.nlm.nih.gov/pubmed/35808208 http://dx.doi.org/10.3390/s22134711 |
Ejemplares similares
-
Secure multiparty quantum key agreement against collusive attacks
por: Abulkasim, Hussein, et al.
Publicado: (2021) -
New Fair Multiparty Quantum Key Agreement Secure against Collusive Attacks
por: Sun, Zhiwei, et al.
Publicado: (2019) -
A Novel Diagnosis Scheme against Collusive False Data Injection Attack
por: Hu, Jiamin, et al.
Publicado: (2023) -
Collision and collusion in physics
por: Fraser, Gordon Murray
Publicado: (1997) -
Securing Cooperative Spectrum Sensing Against Collusive SSDF Attack using XOR Distance Analysis in Cognitive Radio Networks
por: Feng, Jingyu, et al.
Publicado: (2018)