Login / Signup
A Comparison of PHY-Based Fingerprinting Methods Used to Enhance Network Access Control.
Timothy J. Carbino
Michael A. Temple
Juan Lopez Jr.
Published in:
SEC (2015)
Keyphrases
</>
access control
fine grained
security mechanisms
data security
database systems
database applications
security policies
database security
role based access control model