Login / Signup
Security analysis based on Trusted Environment (TRE) of M2M/IoT.
Khamdamboy Urunov
Jung-Il Namgung
Soo-Hyun Park
Published in:
APNOMS (2015)
Keyphrases
</>
security analysis
security requirements
smart card
high security
real time
security properties
public key
encryption scheme
authentication protocol
image encryption
software engineering
distributed systems
access control
lightweight
data warehouse
management system
databases