MitM attacks on intellectual property and integrity of additive manufacturing systems: A security analysis.
Hamza AlkofahiHeba AlawnehAnthony SkjellumPublished in: Comput. Secur. (2024)
Keyphrases
- intellectual property
- manufacturing systems
- security analysis
- stream cipher
- password guessing
- security requirements
- smart card
- security mechanisms
- public key
- manufacturing environment
- high security
- petri net
- defense mechanisms
- complex systems
- security properties
- image encryption
- encryption scheme
- user authentication
- security threats
- authentication protocol
- e government
- holonic manufacturing systems
- security protocols
- elliptic curve cryptography
- cryptographic protocols
- watermarking scheme
- authentication scheme