Author:
Mehraj Tehseen,Khan Burhan Ul Islam,Olanrewaju Rashidah F.,Anwar Farhat,Jusoh Ahmad Zamani Bin
Publisher
Springer International Publishing
Reference55 articles.
1. Abbas, N., Zhang, Y., Taherkordi, A. and Skeie, T., 2018. Mobile edge computing: A survey. IEEE Internet of Things Journal, 5(1), pp. 450-465.
2. Adhikary, N., Shrivastava, R., Kumar, A., Verma, S.K., Bag, M. and Singh, V., 2012. Battering keyloggers and screen recording software by fabricating passwords. International Journal of Computer Network and Information Security, 4(5), p.13.
3. Ambalakat, P., 2005, April. Security of biometric authentication systems. In 21st Computer Science Seminar (p. 1).
4. Andreeva, E., 2012, September. Secret sharing in continuous access control system, using heart sounds. In Problems of Redundancy in Information and Control Systems (RED), 2012 XIII International Symposium on (pp. 5-6). IEEE.
5. Aviv, A.J., Gibson, K.L., Mossop, E., Blaze, M. and Smith, J.M., 2010. Smudge Attacks on Smartphone Touch Screens. Woot, 10, pp. 1-7.