Sign in

Learning-Based Radio Fingerprinting for RFID Secure Authentication Scheme.

Jiaqi XuXingya ZhaoArjun BakshiKannan Srinivasan
Published in: CNS (2022)
Keyphrases
  • authentication scheme
  • low cost
  • security analysis
  • user authentication
  • peer to peer