SHeFU: Secure Hardware-Enabled Protocol for Firmware Updates.
Md Masoom RabbaniJo VliegenMauro ContiNele MentensPublished in: ISCAS (2020)
Keyphrases
- cryptographic protocols
- covert channel
- ibm zenterprise
- authentication protocol
- computer systems
- scalar product
- security protocols
- secure routing
- group communication
- key distribution
- lightweight
- replica control
- key exchange protocol
- privacy preserving
- security analysis
- hardware and software
- low cost
- multi party
- secure multiparty computation
- key agreement protocol
- operating system
- provably secure
- vertically partitioned data
- real time
- security properties
- error detection
- homomorphic encryption
- mutual authentication
- security requirements
- smart card
- input output
- cryptographic algorithms
- electronic voting
- database transactions
- key exchange
- secure multi party
- diffie hellman
- blind signature
- password authentication
- power consumption
- embedded systems
- security model
- key agreement
- wireless sensor networks
- resource manager
- user privacy
- key establishment
- trusted third party
- hardware implementation
- error correction
- trusted computing
- security mechanisms
- key management
- secure communication
- public key
- advanced encryption standard
- mobile agent system
- secret key
- semi honest
- ad hoc networks
- fault tolerant
- standard model
- routing protocol