Login / Signup
RV-TEE: secure cryptographic protocol execution based on runtime verification.
Mark Vella
Christian Colombo
Robert Abela
Peter Spacek
Published in:
J. Comput. Virol. Hacking Tech. (2021)
Keyphrases
</>
cryptographic protocols
security properties
patient specific
standard model
authentication protocol
formal verification
security protocols
insider attacks
encryption decryption
power consumption
statistical shape model
resource consumption
runtime environment