Abstract: In the case of remote work, once a user completes account authentication, they can continue to access confidential data without further verification of user identity. Thus, if a user’s ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results