Abstract: Remote authentication has been extensively studied over the past few decades, with password-based authentication being a common approach since Lamport’s 1981 proposal of a password-based ...
Abstract: A typical cyber-physical system setup includes a local system sending measurements of its internal state to a remote state estimator. A form of attack consists of an eavesdropper observing ...