Continuous user authentication in mobile device and IoT environment
The conventional authentication methods, such as password authentication, fingerprint recognition and face recognition, have many drawbacks and disadvantages. The conventional authentication methods are snapshot and one-time authentication with a very high risk of being hacked. In the early days, th...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Thesis-Master by Research |
Language: | English |
Published: |
Nanyang Technological University
2020
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/143089 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |