Usable Security for an IoT OS: Integrating the Zoo of Embedded Crypto Components Below a Common API.
Lena BoeckmannPeter KietzmannLeandro LanzieriThomas C. SchmidtMatthias WählischPublished in: EWSN (2022)
Keyphrases
- security protocols
- security problems
- key management
- rfid systems
- security mechanisms
- open source
- management system
- information security
- access control
- operating system
- embedded systems
- windows xp
- advanced encryption standard
- private key
- security issues
- statistical databases
- security analysis
- network security
- source code
- resource constrained
- security requirements
- authentication protocol
- intrusion detection