From post

Anti-Clone: A Lightweight Approach for RFID Cloning Attacks Detection.

, , , , , и . CollaborateCom (2), том 461 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 75-90. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

ITAR: A Method for Indoor RFID Trajectory Automatic Recovery., , , , , и . CollaborateCom (2), том 461 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 400-418. Springer, (2022)New QEC codes and EAQEC codes from repeated-root cyclic codes of length 2rps., , , и . CoRR, (2024)R-TDBF: An Environmental Adaptive Method for RFID Redundant Data Filtering., , , , , и . WASA (2), том 13472 из Lecture Notes in Computer Science, стр. 582-594. Springer, (2022)Anti-Clone: A Lightweight Approach for RFID Cloning Attacks Detection., , , , , и . CollaborateCom (2), том 461 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 75-90. Springer, (2022)BPCluster: An Anomaly Detection Algorithm for RFID Trajectory Based on Probability., , , , , и . ISCC, стр. 844-850. IEEE, (2023)