Large-Scale Security Analysis of Real-World Backend Deployments Speaking IoT-Focused Protocols.
Carlotta TagliaroMartina KomsicAndrea ContinellaKevin BorgolteMartina LindorferPublished in: CoRR (2024)
Keyphrases
- security analysis
- back end
- real world
- authentication protocol
- key exchange
- security properties
- mutual authentication
- user friendly
- public key
- smart card
- secure electronic
- security requirements
- data types
- data management
- management system
- data sets
- building blocks
- user authentication
- cloud computing
- low cost
- encryption scheme
- data mining
- data model
- rfid systems
- software systems
- data warehouse
- database