Abstract: This article is devoted to the research and development of innovative two-factor authentication (2FA) methods using neural networks. 2FA plays a key role in ensuring the security of data and ...
Abstract: In the time- and frequency-variant mobile radio channel such as the Fifth- and Forth-Generation mobile communications systems (5G, 4G), it is very important to estimate the channel ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results