Login / Signup
Physical Attestation and Authentication to Detect Cheating in Resource Constrained Smart Micro-grids.
Pacome L. Ambassa
Stephen D. Wolthusen
Anne V. D. M. Kayem
Christoph Meinel
Published in:
CyberICPS@ESORICS (2016)
Keyphrases
</>
resource constrained
security mechanisms
wireless sensor networks
sensor networks
resource constraints
resource limitations
key management
visual sensor networks
multipath
trusted third party
security services
digital signature
embedded systems
end to end
security protocols
trusted computing