Login / Signup
Security Properties of Virtual Remotes and SPOOKing their violations.
Joshua David Oetting Majors
Edgardo Barsallo Yi
Amiya Maji
Darren Wu
Saurabh Bagchi
Aravind Machiry
Published in:
AsiaCCS (2023)
Keyphrases
</>
security properties
security requirements
formal model
security analysis
security protocols
cryptographic protocols
databases
formal methods
security vulnerabilities
key agreement
data mining
multi agent systems
low cost
image compression
information security