Abstract: By the drone capturing attacks, the adversaries can extract the long-term secret keys stored in the drones. Therefore, it is necessary to consider forward secrecy and forward unlinkability ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results