Login / Signup
RFID Secure Application Revocation for IoT in 5G.
Kai Fan
Yuanyuan Gong
Zhao Du
Hui Li
Yintang Yang
Published in:
TrustCom/BigDataSE/ISPA (1) (2015)
Keyphrases
</>
rfid systems
neural network
information systems
supply chain
low cost
access control
big data
ubiquitous computing
key management