Post Quantum Secure Command and Control of Mobile Agents Inserting quantum-resistant encryption schemes in the Secure Robot Operating System.
Richa VarmaChris MelvilleClaudio PinelloTuhin SahaiPublished in: IRC (2020)
Keyphrases
- operating system
- mobile agents
- encryption scheme
- mobile agent system
- public key encryption
- command and control
- distributed systems
- security mechanisms
- application level
- standard model
- computer systems
- security model
- security issues
- virtual machine
- fault tolerant
- network management
- data sharing
- key management
- agent technology
- security requirements
- real time
- hash functions
- data processing
- low cost
- computational intelligence
- multi agent systems