[引用][C] Swarm UAV attack: how to protect sensitive data

V Guyot, A Gademer, L Avanthey, L Beaudoin, R Erra - Proceedings of European …, 2012

Swarm UAV Attack: How to Protect Sensitive Data?

R Erra, V Guyot, L Avanthey, A Gademer… - The Institute Ecole …, 2012 - books.google.com
We consider the following scenario: a swarm of UAVs has a mission and a UAV from it has
been captured: is it possible to secure (in a broad sense) the sensitive data and software in
such a way as to avoid any information leak in this situation. In this article we study a
possible solution using in a complementary way: an embedded secure token (a smartcard);
Shamir's secret sharing algorithm associated to k-ary goodware. Either of these tools can
bring a very high level of security.
以上显示的是最相近的搜索结果。 查看全部搜索结果

Google学术搜索按钮

example.edu/paper.pdf
搜索
获取 PDF 文件
引用
References