Abstract: As the need for information security protection continues to increase, contactless and continuous user authentication solutions are gaining attentions. However, most of the existing schemes ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results