dc.contributor.author | Strand, Martin | en_GB |
dc.date.accessioned | 2022-02-17T10:03:08Z | |
dc.date.accessioned | 2022-02-18T12:12:35Z | |
dc.date.available | 2022-02-17T10:03:08Z | |
dc.date.available | 2022-02-18T12:12:35Z | |
dc.date.issued | 2022-01-24 | |
dc.identifier.citation | Strand. Formalizing swarm security. NIKT: Norsk IKT-konferanse for forskning og utdanning. 2021;3 | en_GB |
dc.identifier.uri | http://hdl.handle.net/20.500.12242/2999 | |
dc.description | Strand, Martin.
Formalizing swarm security. NIKT: Norsk IKT-konferanse for forskning og utdanning 2021 ;Volum 3. | en_GB |
dc.description.abstract | Cheap, capable processors are becoming readily available,
and these are being deployed to a wide variety of applications, ranging
from internet-enabled refrigerators to swarms of specialised drones. As
often is the case with innovations, security lags behind. We aim to introduce the fields of cryptography and swarm modelling to each other,
and present a selection of security definitions and existing schemes that
satisfy these. Such schemes are seen in context of different scenarios to
increase security where it matters. To this end, we further develop a
swarm model to identify when different key structures should be used. | en_GB |
dc.language.iso | en | en_GB |
dc.subject | Autonomi | en_GB |
dc.title | Formalizing swarm security | en_GB |
dc.date.updated | 2022-02-17T10:03:08Z | |
dc.identifier.cristinID | 2002740 | |
dc.source.issn | 1892-0713 | |
dc.source.issn | 1892-0721 | |
dc.type.document | Journal article | |
dc.relation.journal | NIKT: Norsk IKT-konferanse for forskning og utdanning | |