Security analysis on consumer and industrial IoT devices.
Jacob WurmKhoa HoangOrlando AriasAhmad-Reza SadeghiYier JinPublished in: ASP-DAC (2016)
Keyphrases
- security analysis
- smart card
- security model
- security requirements
- public key
- high security
- security properties
- mobile devices
- encryption scheme
- management system
- mutual authentication
- authentication protocol
- encryption algorithm
- user authentication
- image encryption
- cloud computing
- cost effective
- sensor networks
- database systems
- information systems