Cybersecurity Best Practices 2018
DOI: 10.1007/978-3-658-21655-9_41
|View full text |Cite
|
Sign up to set email alerts
|

Learning from the Past: Designing Secure Network Protocols

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5

Relationship

1
4

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 109 publications
0
2
0
Order By: Relevance
“…Vulnerabilities in specific medical devices have been found over the past years (see, e.g., [12,31,30]), and the number of security advisories in the medical space has been growing [42,39]. Currently, there is a trend of research into protocol insecurity [7,10]. Vulnerabilities of the protocols below have been demonstrated.…”
Section: Potential Threats To An Hdo's Networkmentioning
confidence: 99%
“…Vulnerabilities in specific medical devices have been found over the past years (see, e.g., [12,31,30]), and the number of security advisories in the medical space has been growing [42,39]. Currently, there is a trend of research into protocol insecurity [7,10]. Vulnerabilities of the protocols below have been demonstrated.…”
Section: Potential Threats To An Hdo's Networkmentioning
confidence: 99%
“…Security protocols evolve over time, in a complex process that is not only driven by market demands (including usability needs), but also by the interests of diverse actors (e.g., industry, academia, standardization bodies, etc.) [2] and changing security requirements [2,16].…”
Section: Introductionmentioning
confidence: 99%