Protocol, mobility and adversary models for the verification of security

The increasing heterogeneity of communicating devices, ranging from resource constrained battery driven sensor nodes to multi-core processor computers, challenges protocol design. We examine security and privacy protocols with respect to exterior factors such as users, adversaries, and computing and...

Full description

Bibliographic Details
Main Author: Cambazoglu, Volkan
Format: Others
Language:English
Published: Uppsala universitet, Avdelningen för datorteknik 2016
Subjects:
Online Access:http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-202017