Login / Signup
Arbitrator2.0: Preventing Unauthorized Access on Passive Tags.
Han Ding
Jinsong Han
Cui Zhao
Ge Wang
Wei Xi
Zhiping Jiang
Jizhong Zhao
Published in:
IEEE Trans. Mob. Comput. (2022)
Keyphrases
</>
unauthorized access
access control
security policies
intrusion detection system
file system
sensitive data
security vulnerabilities
part of speech
rfid tags
tag recommendation
service providers
intrusion detection
radio frequency identification
metadata
database
information security
query processing
data structure