Login / Signup
Tangible security: Survey of methods supporting secure ad-hoc connects of edge devices with physical context.
Qiao Hu
Jingyi Zhang
Aikaterini Mitrokotsa
Gerhard P. Hancke
Published in:
Comput. Secur. (2018)
Keyphrases
</>
key management
significant improvement
information security
security requirements
security analysis