Abstract: With the popularity of wearable devices, verifying the user identity of wearable devices is critical for system security, especially when performing sensitive operations such as financial ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results