Secure software update and IP protection for untrusted devices in the Internet of Things via physically unclonable functions.
Christopher HuthPaul DuplysTim GüneysuPublished in: PerCom Workshops (2016)
Keyphrases
- mobile devices
- embedded systems
- security level
- update rules
- protection schemes
- software development
- third party
- personal computer
- physical world
- software architecture
- smart objects
- key technologies
- software systems
- security architecture
- computer systems
- information security
- protection scheme
- privacy protection
- sensitive data
- previously mentioned
- key management
- security issues
- security policies
- smart phones
- smart card
- privacy preserving
- context aware