Login / Signup

A Comparison of PHY-Based Fingerprinting Methods Used to Enhance Network Access Control.

Timothy J. CarbinoMichael A. TempleJuan Lopez Jr.
Published in: SEC (2015)
Keyphrases
  • access control
  • fine grained
  • security mechanisms
  • data security
  • database systems
  • database applications
  • security policies
  • database security
  • role based access control model