Login / Signup
Securing IoT Devices by Exploiting Backscatter Propagation Signatures.
Zhiqing Luo
Wei Wang
Qianyi Huang
Tao Jiang
Qian Zhang
Published in:
IEEE Trans. Mob. Comput. (2022)
Keyphrases
</>
management system
smart objects
cross section
signature verification
cloud computing
big data
embedded systems
real time
everyday objects
personal computer
sensor web
identity management
electronic devices
signature scheme
information security
learning algorithm
neural network