Secure Implementations for the Internet of Things.
Jörn-Marc SchmidtPublished in: InfoSecHiComNet (2011)
Keyphrases
- mobile devices
- covert channel
- security analysis
- key exchange
- efficient implementation
- ubiquitous computing
- key technologies
- security issues
- physical world
- security measures
- authentication scheme
- database systems
- information systems
- security mechanisms
- mobile computing
- standard model
- key distribution
- cryptographic protocols
- big data
- lightweight
- stream cipher
- metadata