Abstract: With the widespread use of smartphones, more and more private information is stored on them, which requires a more secure authentication method. Continuous authentication methods show ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results