Login / Signup

Sensing-enabled defenses to RFID unauthorized reading and relay attacks without changing the usage model.

Tzipora HaleviSein LinDi MaAnudath K. PrasadNitesh SaxenaJonathan VorisTuo Xiang
Published in: PerCom (2012)
Keyphrases
  • probabilistic model
  • computational model
  • high level
  • information security
  • real time
  • neural network
  • similarity measure
  • objective function
  • probability distribution
  • digital images
  • statistical model
  • sensitive data