Encrypted IOT
Analyzed Amazon Ring’s encryption protocols, identifying trust and usability trade-offs, and proposed an improved end-to-end encrypted system that enables users to grant timed access to IoT data, informally verified using Tamarin.
Analyzed Amazon Ring’s encryption protocols, identifying trust and usability trade-offs, and proposed an improved end-to-end encrypted system that enables users to grant timed access to IoT data, informally verified using Tamarin.