Exploration of the Role of Cryptoprocessors in Advancing IoT Security.
Elena KakoulliEleftherios ZacharioudakisPublished in: DCOSS-IoT (2024)
Keyphrases
- security problems
- management system
- information security
- security requirements
- key management
- role assignment
- access control
- security systems
- security issues
- security mechanisms
- functional requirements
- security management
- role based access control
- security protocols
- security policies
- intrusion detection
- information systems
- database
- security analysis
- big data
- data security
- security model
- cloud computing
- rfid systems
- neural network
- databases