Secure intermittent-robust computation for energy harvesting device security and outage resilience.
Arman RoohiRonald F. DeMaraLongfei WangSelçuk KösePublished in: SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI (2017)
Keyphrases
- security issues
- security requirements
- security mechanisms
- security properties
- security level
- security measures
- security management
- key exchange
- information security
- integrity verification
- security patterns
- key management
- security protocols
- key exchange protocol
- security architecture
- stream cipher
- network security
- security analysis
- secure communication
- mobile agent system
- security services
- remote server
- public key encryption
- cryptographic protocols
- user authentication
- sensitive data
- rfid tags
- wireless sensor networks
- rfid systems
- intrusion detection
- key establishment
- fault tolerance
- data encryption
- security policies
- key agreement protocol
- secret key
- high security
- authentication protocol
- diffie hellman
- security model