ReDMArk: Bypassing RDMA Security Mechanisms.
Benjamin RothenbergerKonstantin TaranovAdrian PerrigTorsten HoeflerPublished in: USENIX Security Symposium (2021)
Keyphrases
- security mechanisms
- resource constrained
- security issues
- access control
- operating system
- security problems
- smart card
- security systems
- security requirements
- digital signature
- security measures
- security protocols
- security services
- information security
- payment systems
- cryptographic algorithms
- public key infrastructure
- rfid tags
- resource constraints
- end to end
- low cost
- wireless sensor networks
- data sets