Secure Estimation in the Presence of Integrity Attacks.
Yilin MoBruno SinopoliPublished in: IEEE Trans. Autom. Control. (2015)
Keyphrases
- security mechanisms
- secure routing
- security protocols
- stream cipher
- cryptographic protocols
- chosen plaintext
- security issues
- security threats
- integrity verification
- security measures
- block cipher
- security requirements
- estimation algorithm
- information leakage
- cryptographic algorithms
- countermeasures
- trusted computing
- advanced encryption standard
- data protection
- access control
- data integrity
- security analysis
- security flaws
- operating system