Cryptographic protocols with everyday objects.
James HeatherSteve A. SchneiderVanessa TeaguePublished in: Formal Aspects Comput. (2014)
Keyphrases
- everyday objects
- cryptographic protocols
- ambient intelligence
- ubiquitous computing
- standard model
- smart objects
- human interaction
- computational power
- communication technologies
- security protocols
- context aware
- end to end
- authentication protocol
- locally decodable codes
- artificial intelligence
- intelligent systems
- data processing