Now showing items 1-1 of 1
Caller Authentication Using Mobile Devices
(Georgia Institute of Technology, 2019-04-12)
Verifying the identity claim of a caller is challenging to both enterprises and individuals. Blindly trusting the caller is not an option; however, building trust is difficult because the caller’s phone number is easily ...