A first Step towards a Protection Profile for the Security Evaluation of Consensus Mechanisms.
Christine HennebertPublished in: IoTSMS (2020)
Keyphrases
- information security
- security level
- security services
- post processing
- security issues
- security requirements
- security architecture
- intrusion detection
- evaluation method
- security mechanisms
- data protection
- previously mentioned
- information systems
- biometric template
- protection scheme
- security vulnerabilities
- security systems
- countermeasures
- evaluation model
- access control