共 25 条
- [11] Breaking two remote user authentication systems for mobile devices [J]. 2017 IEEE 3RD INTERNATIONAL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY, IEEE 3RD INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING, (HPSC) AND 2ND IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2017, : 37 - 42
- [12] Madan S., 2018, 2018 ADV SCI ENG TEC, P1, DOI DOI 10.1109/ICASET.2018.8376927
- [13] Privacy Preserving Unstructured Big Data Analytics: Issues and Challenges [J]. 1ST INTERNATIONAL CONFERENCE ON INFORMATION SECURITY & PRIVACY 2015, 2016, 78 : 120 - 124
- [16] Securing Mobile Cloud Computing using Biometric Authentication (SMCBA) [J]. 2014 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI), VOL 1, 2014, : 157 - 161
- [17] RATHINARAJA J, 2020, J AMB INTEL HUM COMP, P1
- [18] Sagiroglu S, 2013, PROCEEDINGS OF THE 2013 INTERNATIONAL CONFERENCE ON COLLABORATION TECHNOLOGIES AND SYSTEMS (CTS), P42
- [19] Sarang Rakesh Prasad, 2018, 2018 8th International Conference on Communication Systems and Network Technologies (CSNT), P120, DOI 10.1109/CSNT.2018.8820266
- [20] Shastri A., 2020, Big Data Anal. Healthcare, P55