Sign in

Secure Access Policy (SAP): Invisibly Executing Speculative Unsafe Accesses in an Isolated Environment.

Xiaoni MengQiusong YangYiwei CiPei ZhaoShan ZhaoTianlin HuoMingshu Li
Published in: ICCD (2022)
Keyphrases
  • real time
  • access control
  • mobile rfid
  • database systems
  • mobile robot
  • access patterns