Towards a certification scheme for IoT security evaluation.
Raman BarakatFaruk CatalSascha HackelAxel RennochMartin A. SchneiderPublished in: GI-Jahrestagung (2021)
Keyphrases
- management system
- information security
- security policies
- key management
- access control
- digital signature scheme
- key agreement
- authentication scheme
- security issues
- intrusion detection
- elliptic curve
- security model
- security problems
- provably secure
- identity based cryptography
- security properties
- diffie hellman
- high security
- protection scheme
- key management scheme
- network security