Cited By
View all- Mahfouz A(2024)User Authentication in the IoT and IIoT EnvironmentSmart and Agile Cybersecurity for IoT and IIoT Environments10.4018/979-8-3693-3451-5.ch008(169-194)Online publication date: 30-Jun-2024
- Saadi ZSadiq AAkif OFarhan A(2024)A Survey: Security Vulnerabilities and Protective Strategies for Graphical PasswordsElectronics10.3390/electronics1315304213:15(3042)Online publication date: 1-Aug-2024
- Xu ZLiu TJiang RHu PGuo ZLiu C(2024)AFaceProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/36435108:1(1-33)Online publication date: 6-Mar-2024
- Show More Cited By