Abstract: Authenticating RFID-tagged items during mobile inventory, such as entering or leaving the warehouse, is a critical task for anti-counterfeiting. However, past authentication solutions using ...
You might think people would be more likely to fall for phishing scams on mobile phones because they are often on the go or multitasking when using them. A recent study, however, suggests the opposite ...
Abstract: The continuous development of mobile communication technologies has led to a rapid increase in cellular network traffic. Therefore, traffic prediction models have become very important for ...
一些您可能无法访问的结果已被隐去。
显示无法访问的结果