Abstract: Remote authentication has been extensively studied over the past few decades, with password-based authentication being a common approach since Lamport’s 1981 proposal of a password-based ...
Abstract: A typical cyber-physical system setup includes a local system sending measurements of its internal state to a remote state estimator. A form of attack consists of an eavesdropper observing ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results