Detail publikace

Cryptographic Protocols for Confidentiality, Authenticity and Privacy on Constrained Devices

HAJNÝ, J. DZURENDA, P. CASANOVA MARQUÉS, R. MALINA, L.

Originální název

Cryptographic Protocols for Confidentiality, Authenticity and Privacy on Constrained Devices

Anglický název

Cryptographic Protocols for Confidentiality, Authenticity and Privacy on Constrained Devices

Jazyk

en

Originální abstrakt

In this paper, we present the design of cryptographic protocols that provide the crucial security and privacy-protection features while they're fully implementable on constrained devices.

Anglický abstrakt

In this paper, we present the design of cryptographic protocols that provide the crucial security and privacy-protection features while they're fully implementable on constrained devices.

Dokumenty

BibTex


@inproceedings{BUT165663,
  author="Jan {Hajný} and Petr {Dzurenda} and Raúl {Casanova Marqués} and Lukáš {Malina}",
  title="Cryptographic Protocols for Confidentiality, Authenticity and Privacy on Constrained Devices",
  annote="In this paper, we present the design of cryptographic protocols that provide the crucial security and privacy-protection features while they're fully implementable on constrained devices.",
  booktitle="Proceedings of 2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)",
  chapter="165663",
  doi="10.1109/ICUMT51630.2020.9222243",
  howpublished="online",
  year="2020",
  month="october",
  pages="1--6",
  type="conference paper"
}