Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3221813
Abstract: With the rapid development of networking and computing technology, users can easily store and interact with sensitive information on smart devices. Since smart devices are vulnerable to unauthorized access or theft, the security of personal…
read more here.
Keywords:
authentication;
sensor compensation;
wearable sensors;
compensation algorithm ... See more keywords