A Prototype Implementation of Continuous Authentication for Tactical Applications

Abstract

Recent advances in wireless and computing technology have led to accelerated efforts to equip soldiers at the tactical level with sophisticated handheld communications devices to share situational awareness data. An important consideration is how to secure these devices, and how to ensure that the users of the devices have not been compromised. This paper… (More)
DOI: 10.1007/978-3-319-51204-4_28

Topics

5 Figures and Tables

Slides referencing similar topics