|
ComputingReviews.com
|
The yoking-proof-based authentication protocol for cloud-assisted wearable devices Liu W., Liu H., Wan Y., Kong H., Ning H. Personal and Ubiquitous Computing20(3):469-479,2016.Type:Article |
|
|
|
Published By: Springer-Verlag |
|
|
|
|
|
|
|
|
Use your personal or institutional subscription to read the fulltext of the article.
|
|
|
|
|
|
|
|
|
|
|
|