Penetration and Security of OpenSSH Remote Secure Shell Service on Raspberry Pi 2.
Hesham H. AlsaadiMonther AldwairiMay Al TaeiMansoor AlBuainainMaktoom AlKubaisiPublished in: NTMS (2018)
Keyphrases
- security services
- security issues
- security requirements
- security measures
- security level
- security mechanisms
- security management
- security protocols
- key management
- security analysis
- security policies
- application level
- information security
- data encryption
- network access
- security model
- key agreement protocol
- security properties
- data security
- encryption scheme
- access control
- diffie hellman
- security architecture
- security patterns
- integrity verification
- authentication mechanism
- key agreement
- user authentication
- cryptographic protocols
- stream cipher
- unauthorized access
- sensitive data
- key exchange protocol
- key exchange
- authentication protocol
- network security
- electronic voting
- service providers
- secure multiparty computation
- trusted third party
- public key encryption
- mobile agent system
- service management
- key distribution
- mobile payment
- web services
- previously mentioned
- intrusion detection
- public key cryptosystem
- key establishment
- network management
- digital signature
- remote server
- authentication scheme
- identity management
- secure communication
- trusted computing
- key management scheme
- resource constrained
- smart card
- privacy preserving
- wireless networks
- digital rights management
- secure routing
- digital signature scheme