A secure and authenticated host-to-memory communication interface.
Niccolò IzzoAlessandro BarenghiLuca BreveglieriGerardo PelosiPaolo AmatoPublished in: CF (2019)
Keyphrases
- key exchange protocol
- key exchange
- computer interface
- authentication scheme
- secure communication
- communication protocol
- group communication
- key distribution
- key agreement protocol
- communication infrastructure
- user interface
- lightweight
- state information
- resource constrained
- key management
- memory usage
- multi party
- fault tolerance
- user friendly
- smart objects
- password based authenticated key exchange
- authentication protocol
- elliptic curve
- security analysis
- security mechanisms
- security issues
- communication systems
- communication cost
- memory requirements
- computer networks
- information sharing