Author:
Bułat Radosław,Ogiela Marek R.
Publisher
Springer International Publishing
Reference16 articles.
1. Sfar, A.R., Natalizio, E., Challal, Y., Chtourou, Z.: A roadmap for security challenges in the Internet of Things. Digit. Commun. Netw. 4(2), 118–137 (2018)
2. Loukil, F., Ghedira, C., Aïcha-Nabila, B., Boukadi, K., Maamar, Z.: Privacy-aware in the IoT applications: a systematic literature review. In: International Conference on Cooperative Information Systems (CoopIS) 2017. Proceedings, Part I. LNCS, vol. 10573, pp. 552–569 (2017)
3. Menezes A., Van Oorschot P., Vanstone S.: Handbook of Applied Cryptography, CRC, New York (1997)
4. Liang, Y., Samtani, S., Guo, B., Yu, Z.: Behavioral biometrics for continuous authentication in the Internet-of-Things era: an artificial intelligence perspective. IEEE Internet Things J. 7(9), 9128–9143 (2020)
5. Traore, I., Ahmed, E.A.: Continuous Authentication Using Biometrics: Data, Models, and Metrics, 1st edn. IGI Global, Harrisburg (2011)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献