Abstract: As the need for information security protection continues to increase, contactless and continuous user authentication solutions are gaining attentions. However, most of the existing schemes ...
Abstract: Authentication is an important security issue for multi-access edge computing (MEC). To restrict user access from untrusted devices, Bring Your Own Device (BYOD) policy has been proposed to ...