Towards defending eavesdropping on NFC.
A. B. M. Alim Al IslamTusher ChakrabortyTaslim Arefin KhanMahabub ZorafChowdhury Sayeed HyderPublished in: J. Netw. Comput. Appl. (2017)
Keyphrases
- mobile devices
- mobile phone
- ddos attacks
- smart phones
- wifi
- communication technologies
- database
- databases
- computational intelligence
- neural network
- sensor networks
- multi dimensional
- expert systems
- end to end
- data structure
- xml documents
- relational databases
- data management
- database systems
- artificial intelligence
- transaction model