Conceivable security risks and authentication techniques for smart devices: A comparative evaluation of security practices

Syeda Mariam Muzammal, Munam Ali Shah, Sijing Zhang, Hongji Yang. Conceivable security risks and authentication techniques for smart devices: A comparative evaluation of security practices. Int. J. Autom. Comput., 13(4):350-363, 2016. [doi]

@article{MuzammalSZY16,
  title = {Conceivable security risks and authentication techniques for smart devices: A comparative evaluation of security practices},
  author = {Syeda Mariam Muzammal and Munam Ali Shah and Sijing Zhang and Hongji Yang},
  year = {2016},
  doi = {10.1007/s11633-016-1011-5},
  url = {https://doi.org/10.1007/s11633-016-1011-5},
  researchr = {https://researchr.org/publication/MuzammalSZY16},
  cites = {0},
  citedby = {0},
  journal = {Int. J. Autom. Comput.},
  volume = {13},
  number = {4},
  pages = {350-363},
}