Show simple item record

dc.contributor.authorStrand, Martinen_GB
dc.date.accessioned2022-02-17T10:03:08Z
dc.date.accessioned2022-02-18T12:12:35Z
dc.date.available2022-02-17T10:03:08Z
dc.date.available2022-02-18T12:12:35Z
dc.date.issued2022-01-24
dc.identifier.citationStrand. Formalizing swarm security. NIKT: Norsk IKT-konferanse for forskning og utdanning. 2021;3en_GB
dc.identifier.urihttp://hdl.handle.net/20.500.12242/2999
dc.descriptionStrand, Martin. Formalizing swarm security. NIKT: Norsk IKT-konferanse for forskning og utdanning 2021 ;Volum 3.en_GB
dc.description.abstractCheap, capable processors are becoming readily available, and these are being deployed to a wide variety of applications, ranging from internet-enabled refrigerators to swarms of specialised drones. As often is the case with innovations, security lags behind. We aim to introduce the fields of cryptography and swarm modelling to each other, and present a selection of security definitions and existing schemes that satisfy these. Such schemes are seen in context of different scenarios to increase security where it matters. To this end, we further develop a swarm model to identify when different key structures should be used.en_GB
dc.language.isoenen_GB
dc.subjectAutonomien_GB
dc.titleFormalizing swarm securityen_GB
dc.date.updated2022-02-17T10:03:08Z
dc.identifier.cristinID2002740
dc.source.issn1892-0713
dc.source.issn1892-0721
dc.type.documentJournal article
dc.relation.journalNIKT: Norsk IKT-konferanse for forskning og utdanning


Files in this item

This item appears in the following Collection(s)

Show simple item record