Login / Signup
Application of ID cards - security components.
Radek Holy
Marek Kalika
Jan Scherks
Published in:
ICSPCS (2012)
Keyphrases
</>
network connection
information retrieval
artificial intelligence
knowledge base
case study
access control
network security
application specific
malware detection