Research Article
A Rhythm-Based Authentication Scheme for Smart Media Devices
Table 5
Comparison of the existing locking systems and the RLS against various attacks.
| ||||||||||||||||||||||||||||||||||||||||
O: strong, △: medium, and X: weak. |
| ||||||||||||||||||||||||||||||||||||||||
O: strong, △: medium, and X: weak. |