Login / Signup

Application of ID cards - security components.

Radek HolyMarek KalikaJan Scherks
Published in: ICSPCS (2012)
Keyphrases
  • network connection
  • information retrieval
  • artificial intelligence
  • knowledge base
  • case study
  • access control
  • network security
  • application specific
  • malware detection