Jyothi P Joy

Suggest Changes
We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
Traditional authentication methods are vulnerable to different types of attacks. The authentication scheme like password or PIN-based have proven to be vulnerable to different forms of observation(More)
  • 1