Enabling Security Analysis of IoT Device-to-Cloud Traffic.
Eda ZhouJoseph TurcotteLorenzo De CarliPublished in: TrustCom (2020)
Keyphrases
- security analysis
- cloud computing
- smart card
- public key
- security requirements
- high security
- management system
- image encryption
- user authentication
- network traffic
- encryption scheme
- big data
- data management
- encryption algorithm
- authentication scheme
- mutual authentication
- security issues
- database systems
- authentication protocol
- rfid systems
- access control
- real time