Related references
Note: Only part of the references are listed.Path planning techniques for unmanned aerial vehicles: A review, solutions, and challenges
Shubhani Aggarwal et al.
COMPUTER COMMUNICATIONS (2020)
A robust distance-based relay selection for message dissemination in vehicular network
Dun Cao et al.
WIRELESS NETWORKS (2020)
Communication-Efficient Data Aggregation Tree Construction for Complex Queries in IoT Applications
Bo Yin et al.
IEEE INTERNET OF THINGS JOURNAL (2019)
An empower hamilton loop based data collection algorithm with mobile agent for WSNs
Jin Wang et al.
HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES (2019)
Blockchain-Based Mutual-Healing Group Key Distribution Scheme in Unmanned Aerial Vehicles Ad-Hoc Network
Xinghua Li et al.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2019)
Multimodel Framework for Indoor Localization Under Mobile Edge Computing Environment
Wenjun Li et al.
IEEE INTERNET OF THINGS JOURNAL (2019)
PrivBioMTAuth: Privacy Preserving Biometrics-Based and User Centric Protocol for User Authentication From Mobile Phones
Hasini Gunasinghe et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)
PassBio: Privacy-Preserving User-Centric Biometric Authentication
Kai Zhou et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)
The impact of application context on privacy and performance of keystroke authentication systems
Kiran S. Balagani et al.
JOURNAL OF COMPUTER SECURITY (2018)
Mobile relay deployment in multihop relay networks
Zhuofan Liao et al.
COMPUTER COMMUNICATIONS (2017)
An Efficient User Verification System Using Angle-Based Mouse Movement Biometrics
Nan Zheng et al.
ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY (2016)
Multimodal Biometrics for Enhanced Mobile Device Security
Mikhail I. Gofman et al.
COMMUNICATIONS OF THE ACM (2016)
HMOG: New Behavioral Biometric Features for Continuous Authentication of Smartphone Users
Zdenka Sitova et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2016)
Targeted Online Password Guessing: An Underestimated Threat
Ding Wang et al.
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2016)
Reconciling user privacy and implicit authentication for mobile devices
Siamak F. Shahandashti et al.
COMPUTERS & SECURITY (2015)
Continuous user authentication using multi-modal biometrics
Hataichanok Saevanee et al.
COMPUTERS & SECURITY (2015)
Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment
Ding Wang et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2015)
Secure Outsourced Biometric Authentication With Performance Evaluation on Smartphones
Jaroslav Sedenka et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)
Gait authentication on mobile phone using biometric cryptosystem and fuzzy commitment scheme
Thang Hoang et al.
INTERNATIONAL JOURNAL OF INFORMATION SECURITY (2015)
Improving Accuracy, Applicability and Usability of Keystroke Biometrics on Mobile Touchscreen Devices
Daniel Buschek et al.
CHI 2015: PROCEEDINGS OF THE 33RD ANNUAL CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS (2015)
Transparent GPU Execution of NumPy Applications
Troels Blum et al.
PROCEEDINGS OF 2014 IEEE INTERNATIONAL PARALLEL & DISTRIBUTED PROCESSING SYMPOSIUM WORKSHOPS (IPDPSW) (2014)
Seeing beyond visibility: A Four Way Fusion of User Authentication for Efficient Usable Security on Mobile Devices
Farzana Rahman et al.
2014 IEEE EIGHTH INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND RELIABILITY - COMPANION (SERE-C 2014) (2014)
Bi-Modal Person Recognition on a Mobile Phone: using mobile phone data
Chris McCool et al.
2012 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO WORKSHOPS (ICMEW) (2012)