Amritha Nag's scientific contributions

Citations

... By protecting them, more privacy of the relevant contents should have achieved. Protecting these places requires, for example, a security scheme for the door by locking and unlocking it via an IoT application [62]. Therefore, to allow a securely authorized access to that workplace, there should be a verification of the identification (ID) of the person who is aiming to access. ...