A Prototype Implementation of Continuous Authentication for Tactical Applications


Recent advances in wireless and computing technology have led to accelerated efforts to equip soldiers at the tactical level with sophisticated handheld communications devices to share situational awareness data. An important consideration is how to secure these devices, and how to ensure that the users of the devices have not been compromised. This paper… (More)
DOI: 10.1007/978-3-319-51204-4_28


5 Figures and Tables

Slides referencing similar topics