Publication detail

Cryptographic Protocols for Confidentiality, Authenticity and Privacy on Constrained Devices

HAJNÝ, J. DZURENDA, P. CASANOVA MARQUÉS, R. MALINA, L.

Original Title

Cryptographic Protocols for Confidentiality, Authenticity and Privacy on Constrained Devices

Type

conference paper

Language

English

Original Abstract

In this paper, we present the design of cryptographic protocols that provide the crucial security and privacy-protection features while they're fully implementable on constrained devices.

Keywords

confidentiality;integrity;authenticity;privacy;constrained devices

Authors

HAJNÝ, J.; DZURENDA, P.; CASANOVA MARQUÉS, R.; MALINA, L.

Released

5. 10. 2020

ISBN

978-1-7281-9281-9

Book

Proceedings of 2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)

Pages from

1

Pages to

6

Pages count

6

BibTex

@inproceedings{BUT165663,
  author="Jan {Hajný} and Petr {Dzurenda} and Raúl {Casanova-Marqués} and Lukáš {Malina}",
  title="Cryptographic Protocols for Confidentiality, Authenticity and Privacy on Constrained Devices",
  booktitle="Proceedings of 2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)",
  year="2020",
  pages="1--6",
  doi="10.1109/ICUMT51630.2020.9222243",
  isbn="978-1-7281-9281-9"
}