Login / Signup
On the application of sensor authentication with intrinsic physical features to vehicle security.
Gianmarco Baldini
Raimondo Giuliani
Monica Gemo
Franc Dimc
Published in:
Comput. Electr. Eng. (2021)
Keyphrases
</>
real time
feature vectors
feature extraction
intrusion detection
security requirements
security mechanisms
security analysis
identity authentication
data encryption
encryption decryption
network connection
sensor networks
feature set
security policies
security systems
integrity verification