Conceivable security risks and authentication techniques for smart devices: A comparative evaluation of security practices
Crossref DOI link: https://doi.org/10.1007/s11633-016-1011-5
Published Online: 2016-06-29
Published Print: 2016-08
Update policy: https://doi.org/10.1007/springer_crossmark_policy
Muzammal, Syeda Mariam
Shah, Munam Ali
Zhang, Si-Jing
Yang, Hong-Ji
License valid from 2016-06-29