Smart verification algorithm for IoT applications using QR tag

Electrical engineering; Mathematical techniques; Brute-force attack; Information leakage; Internet of Things (IOT); QR tag; Security objectives; Smart applications; Unauthorized access; Verification algorithms; Internet of things

Saved in:
Bibliographic Details
Main Authors: Al-Ghaili A.M., Kasim H., Rahim F.A., Ibrahim Z.-A., Othman M., Hassan Z.
Other Authors: 26664381500
Format: Conference Paper
Published: Springer Verlag 2023
Tags: Add Tag
No Tags, Be the first to tag this record!
Be the first to leave a comment!
You must be logged in first