Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks 2022
DOI: 10.1145/3507657.3528539
|View full text |Cite
|
Sign up to set email alerts
|

Take a Bite of the Reality Sandwich

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5

Relationship

1
4

Authors

Journals

citations
Cited by 10 publications
(1 citation statement)
references
References 50 publications
0
1
0
Order By: Relevance
“…Likewise, the unique characteristics of industrial settings and especially the resource constraints of industrial devices require adapting traditional security paradigms, especially in wireless settings. Our research work, e.g., allows us to efficiently realize message authentication for short messages (Wagner et al 2022a) or to speed up the computation of message authentication tags in the latency-critical input-dependent part through bitwise precomputations (Wagner et al 2022c).…”
Section: Network Securitymentioning
confidence: 99%
“…Likewise, the unique characteristics of industrial settings and especially the resource constraints of industrial devices require adapting traditional security paradigms, especially in wireless settings. Our research work, e.g., allows us to efficiently realize message authentication for short messages (Wagner et al 2022a) or to speed up the computation of message authentication tags in the latency-critical input-dependent part through bitwise precomputations (Wagner et al 2022c).…”
Section: Network Securitymentioning
confidence: 99%