Secure Device Bootstrapping Without Secrets Resistant to Signal Manipulation Attacks.
Nirnimesh GhoseLoukas LazosMing LiPublished in: IEEE Symposium on Security and Privacy (2018)
Keyphrases
- secure routing
- security protocols
- cryptographic protocols
- security mechanisms
- stream cipher
- chosen plaintext
- signal processing
- cryptographic algorithms
- information leakage
- security measures
- remote user authentication scheme
- smart card
- security flaws
- countermeasures
- block cipher
- sensitive information
- non stationary
- authentication scheme
- advanced encryption standard
- remote server
- information extraction
- watermarking scheme
- security issues
- encryption scheme
- high frequency
- security properties
- security management
- security requirements
- lightweight
- heart rate
- rfid tags
- wavelet transform
- asked questions
- sql injection
- routing protocol
- ad hoc networks