Login / Signup
Security Model for Internet of Things End Devices.
S. Rajashree
Pritam Gajkumar Shah
S. Murali
Published in:
iThings/GreenCom/CPSCom/SmartData (2018)
Keyphrases
</>
security model
mobile devices
access control
public key
physical world
security analysis
security requirements
provably secure
anomaly detection
encryption scheme
public key cryptography
designated verifier
case study
fine grained
key technologies