Report - Using Physical Context-Based Authentication against ...downloads.hindawi.com/journals/scn/2018/6590928.pdf · Relay attacks against mobile and wireless networks can ... Furthermore,

Please pass captcha verification before submit form