Access control in cyber-physical systems using steganography and digital signatures.
Laura VeghLiviu MicleaPublished in: ICIT (2015)
Keyphrases
- access control
- digital signature
- cyber physical systems
- security mechanisms
- smart card
- public key
- security policies
- security requirements
- embedded systems
- digital watermarking
- access control policies
- copyright protection
- data hiding
- data integrity
- elliptic curve
- signature scheme
- key management
- security model
- resource constrained
- watermarking technique
- security issues
- data mining