Effect of attacker characterization in ECG-based continuous authentication mechanisms for Internet of Things

P Peris-Lopez, L González-Manzano, C Camara… - Future Generation …, 2018 - Elsevier
Wearable devices enable retrieving data from their porting user, among other applications.
When combining them with the Internet of Things (IoT) paradigm, a plethora of services can …

[PDF][PDF] Effect of attacker characterization in ECG-based continuous authentication mechanisms for Internet of Things

P Peris-Lopez, L González-Manzano… - Future Generation …, 2018 - carmen-camara.com
abstract Wearable devices enable retrieving data from their porting user, among other
applications. When combining them with the Internet of Things (IoT) paradigm, a plethora of …

[PDF][PDF] Effect of attacker characterization in ECG-based continuous authentication mechanisms for Internet of Things

P Peris-Lopez… - Future …, 2018 - lightweightcryptography.com
abstract Wearable devices enable retrieving data from their porting user, among other
applications. When combining them with the Internet of Things (IoT) paradigm, a plethora of …

Effect of attacker characterization in ECG-based continuous authentication mechanisms for Internet of Things

P Peris-Lopez, L Gonzlez-Manzano… - Future Generation …, 2018 - dl.acm.org
Wearable devices enable retrieving data from their porting user, among other applications.
When combining them with the Internet of Things (IoT) paradigm, a plethora of services can …

[PDF][PDF] Effect of attacker characterization in ECG-based continuous authentication mechanisms for Internet of Things

P Peris-Lopez, L González-Manzano… - Future Generation …, 2018 - carmen-camara.com
abstract Wearable devices enable retrieving data from their porting user, among other
applications. When combining them with the Internet of Things (IoT) paradigm, a plethora of …

[PDF][PDF] Effect of attacker characterization in ECG-based continuous authentication mechanisms for Internet of Things

P Peris-Lopez… - Future …, 2018 - lightweightcryptography.com
abstract Wearable devices enable retrieving data from their porting user, among other
applications. When combining them with the Internet of Things (IoT) paradigm, a plethora of …