Sign in

Tangible security: Survey of methods supporting secure ad-hoc connects of edge devices with physical context.

Qiao HuJingyi ZhangAikaterini MitrokotsaGerhard P. Hancke
Published in: Comput. Secur. (2018)
Keyphrases
  • key management
  • significant improvement
  • information security
  • security requirements
  • security analysis