Abstract: As the need for information security protection continues to increase, contactless and continuous user authentication solutions are gaining attentions. However, most of the existing schemes ...
Abstract: Authentication is an important security issue for multi-access edge computing (MEC). To restrict user access from untrusted devices, Bring Your Own Device (BYOD) policy has been proposed to ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results