Login / Signup
Sensing-enabled defenses to RFID unauthorized reading and relay attacks without changing the usage model.
Tzipora Halevi
Sein Lin
Di Ma
Anudath K. Prasad
Nitesh Saxena
Jonathan Voris
Tuo Xiang
Published in:
PerCom (2012)
Keyphrases
</>
probabilistic model
computational model
high level
information security
real time
neural network
similarity measure
objective function
probability distribution
digital images
statistical model
sensitive data