Cited By
View all- Nag AHassan MDas ASinha AChand NKar ASharma VAlkhayyat A(2024)Exploring the applications and security threats of Internet of Thing in the cloud computing paradigmTransactions on Emerging Telecommunications Technologies10.1002/ett.489735:4Online publication date: 8-Apr-2024
- Iwakiri SMurao K(2023)User Authentication Method for Wearable Ring Devices using Active Acoustic SensingProceedings of the 2023 ACM International Symposium on Wearable Computers10.1145/3594738.3611357(17-21)Online publication date: 8-Oct-2023
- Yang CChang CLiang D(2018)A Novel GMM-Based Behavioral Modeling Approach for Smartwatch-Based Driver AuthenticationSensors10.3390/s1804100718:4(1007)Online publication date: 28-Mar-2018