Automated Analysis of Secure Internet of Things Protocols.
Jun Young KimRalph HolzWen HuSanjay JhaPublished in: ACSAC (2017)
Keyphrases
- automated analysis
- cryptographic protocols
- security protocols
- key distribution
- key exchange
- authentication protocol
- automated detection
- key agreement protocol
- visual analysis
- secure multiparty computation
- multi party
- mobile devices
- key establishment
- security services
- security properties
- biomedical imaging
- application level
- security analysis
- privacy preserving
- key technologies
- homomorphic encryption
- group communication
- smart card
- motion imagery
- vocal cord
- databases
- key management
- cell nuclei
- secret key
- security requirements
- ubiquitous computing