Login / Signup
Cryptographic Protocols for Confidentiality, Authenticity and Privacy on Constrained Devices.
Jan Hajny
Petr Dzurenda
Raul Casanova Marques
Lukas Malina
Published in:
ICUMT (2020)
Keyphrases
</>
cryptographic protocols
security properties
private information retrieval
standard model
authentication protocol
mobile devices
security protocols
rfid tags
sensor networks
access control
privacy preserving
cost effective
embedded systems
user privacy
encryption decryption