Login / Signup
A risk-driven security analysis for a bluetooth low energy based microdata ecosystem.
Tapio Frantti
Juha Röning
Published in:
ICUFN (2014)
Keyphrases
</>
security analysis
data swapping
security requirements
smart card
public key
high security
authentication protocol
image encryption
ubiquitous computing
authentication scheme
disclosure risk
mutual authentication
privacy preserving
encryption scheme
software architecture
data quality