Usable Security for an IoT OS: Integrating the Zoo of Embedded Crypto Components Below a Common API.
Lena BoeckmannPeter KietzmannLeandro LanzieriThomas C. SchmidtMatthias WählischPublished in: CoRR (2022)
Keyphrases
- security protocols
- security problems
- open source
- operating system
- information security
- key management
- security mechanisms
- rfid systems
- security requirements
- security issues
- windows xp
- network security
- private key
- security policies
- statistical databases
- embedded systems
- source code
- digital signature
- mobile computing
- information systems
- ubiquitous computing
- software components
- software systems
- access control
- management system