Login / Signup
Security analysis and exploitation of arduino devices in the internet of things.
Carlos Alberca
Sergio Pastrana
Guillermo Suarez-Tangil
Paolo Palmieri
Published in:
Conf. Computing Frontiers (2016)
Keyphrases
</>
security analysis
mobile devices
physical world
security requirements
public key
smart card
security properties
image encryption
high security
encryption scheme
key technologies
authentication protocol
user authentication
encryption algorithm
ubiquitous computing
data management
authentication scheme
databases