Preventing Scaling of Successful Attacks: A Cross-Layer Security Architecture for Resource-Constrained Platforms
From MaRDI portal
Publication:2947109
DOI10.1007/978-3-319-21356-9_8zbMath1401.94181OpenAlexW2293482595MaRDI QIDQ2947109
Christof Paar, Christian T. Zenger, Hans D. Schotten, Fredrik Winzer, Abhijit Ambekar, Thomas Pöppelmann
Publication date: 21 September 2015
Published in: Cryptography and Information Security in the Balkans (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-21356-9_8
Internet of Thingsforward secrecybackward secrecychannel-based key establishmentcross-layer protocolscaling of attacks
Cites Work
- Unnamed Item
- Unnamed Item
- Unconventional cryptographic keying variable management
- Fuming Acid and Cryptanalysis: Handy Tools for Overcoming a Digital Locking and Access Control System
- Factoring RSA Keys from Certified Smart Cards: Coppersmith in the Wild
- On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping Scheme
- Fundamentals of Wireless Communication
- Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets