Security analysis of Internet-of-Things: A case study of august smart lock.
Mengmei YeNan JiangHao YangQiben YanPublished in: INFOCOM Workshops (2017)
Keyphrases
- security analysis
- smart objects
- security requirements
- smart card
- security properties
- high security
- public key
- image encryption
- key technologies
- authentication protocol
- security model
- case study
- user authentication
- encryption algorithm
- encryption scheme
- authentication scheme
- mutual authentication
- mobile devices
- multiresolution
- ubiquitous computing
- query processing
- proxy signature scheme