Sign Up to like & get
recommendations!
0
Published in 2021 at "IEEE Access"
DOI: 10.1109/access.2021.3061589
Abstract: Building safeguards against illegitimate access and authentication is a cornerstone for securing systems. Existing user authentication schemes suffer from challenges in detecting impersonation attacks which leave systems vulnerable and susceptible to misuse. A range of…
read more here.
Keywords:
continuous multimodal;
authentication;
biometric authentication;
multimodal biometric ... See more keywords