"Caesar: high-speed and memory-efficient forwarding engine for future...
M. Moradi, F. Qian, Q. Xu, Z. M. Mao, D. Bethea, M. K. Reiter. 2015. "Caesar: high-speed and memory-efficient forwarding engine for future internet architecture". 2015 ACM/IEEE Symposium on...
View ArticleCryptanalysis and improvement of two RFID-OT protocols based on quadratic...
Jin, Y., Zhu, H., Shi, Z., Lu, X., Sun, L.. 2015. Cryptanalysis and improvement of two RFID-OT protocols based on quadratic residues. 2015 IEEE International Conference on Communications (ICC)....
View ArticleSecure object tracking protocol for Networked RFID Systems
Ray, B., Howdhury, M., Abawajy, J., Jesmin, M.. 2015. Secure object tracking protocol for Networked RFID Systems. 2015 IEEE/ACIS 16th International Conference on Software Engineering, Artificial...
View ArticleLADP: A lightweight authentication and delegation protocol for RFID tags
Li, Gaochao, Xu, Xiaolin, Li, Qingshan. 2015. LADP: A lightweight authentication and delegation protocol for RFID tags. 2015 Seventh International Conference on Ubiquitous and Future Networks. :860–865.
View ArticleVerified Secure Implementations for the HTTPS Ecosystem: Invited Talk
Fournet, Cédric. 2016. Verified Secure Implementations for the HTTPS Ecosystem: Invited Talk. Proceedings of the 2016 ACM Workshop on Programming Languages and Analysis for Security. :89–89.
View ArticleCRII: SaTC: Analyzing and verifying the security of TCP stacks under...
The objective of this project is to strengthen the Transmission Control Protocol (TCP), a ubiquitous core Internet protocol, under emerging threat models to make it robust and secure enough to serve...
View ArticleTWC: Small: Collaborative: Multipath TCP Side Channel Vulnerabilities and...
The objective of this project is to understand and strengthen the security of Multipath TCP (MPTCP) - an IETF standardized suite of TCP extensions that allow one MPTCP connection, consisting of...
View ArticleReview on RFID Identity Authentication Protocols Based on Hash Function
Bing, Y., Baolong, L., Hua, C.. 2017. Review on RFID Identity Authentication Protocols Based on Hash Function. 2017 International Conference on Computer Network, Electronic and Automation (ICCNEA)....
View ArticleA lightweight RFID authentication protocol with confidentiality and anonymity
Shi, Z., Chen, J., Chen, S., Ren, S.. 2017. A lightweight RFID authentication protocol with confidentiality and anonymity. 2017 IEEE 2nd Advanced Information Technology, Electronic and Automation...
View ArticleSECURECONFIG: NFC and QR-code based hybrid approach for smart sensor...
Ulz, T., Pieber, T., Steger, C., Lesjak, C., Bock, H., Matischek, R.. 2017. SECURECONFIG: NFC and QR-code based hybrid approach for smart sensor configuration. 2017 IEEE International Conference on...
View ArticleAttack scenarios and security analysis of MQTT communication protocol in IoT...
Andy, S., Rahardjo, B., Hanindhito, B.. 2017. Attack scenarios and security analysis of MQTT communication protocol in IoT system. 2017 4th International Conference on Electrical Engineering,...
View ArticleOptimized event notification in CAN through in-frame replies and Bloom filters
G. Bloom, G. Cena, I. C. Bertolotti, T. Hu, A. Valenzano. 2017. Optimized event notification in CAN through in-frame replies and Bloom filters. 2017 IEEE 13th International Workshop on Factory...
View ArticleContinuous Biometric Verification for Non-Repudiation of Remote Services
Schiavone, E., Ceccarelli, A., Bondavalli, A.. 2017. Continuous Biometric Verification for Non-Repudiation of Remote Services. Proceedings of the 12th International Conference on Availability,...
View ArticleSpecification, Design, and Verification of an Accountability-aware...
Antignac, Thibaud, Mukelabai, Mukelabai, Schneider, Gerardo. 2017. Specification, Design, and Verification of an Accountability-aware Surveillance Protocol. Proceedings of the Symposium on Applied...
View ArticleA review of black-hole attack mitigation techniques and its drawbacks in...
Gurung, S., Chauhan, S.. 2017. A review of black-hole attack mitigation techniques and its drawbacks in Mobile Ad-hoc Network. 2017 International Conference on Wireless Communications, Signal...
View ArticleA New Version of Kerberos Authentication Protocol Using ECC and Threshold...
Sutradhar, M. R., Sultana, N., Dey, H., Arif, H.. 2018. A New Version of Kerberos Authentication Protocol Using ECC and Threshold Cryptography for Cloud Security. 2018 Joint 7th International...
View ArticleA Cryptographic Look at Multi-party Channels
Eugster, P., Marson, G. A., Poettering, B.. 2018. A Cryptographic Look at Multi-party Channels. 2018 IEEE 31st Computer Security Foundations Symposium (CSF). :31–45.
View ArticleAnalytical Study on Mobile Ad Hoc Networks for IPV6
Jain, Jay Kumar, Chauhan, Dipti. 2019. Analytical Study on Mobile Ad Hoc Networks for IPV6. 2019 4th International Conference on Internet of Things: Smart Innovation and Usages (IoT-SIU). :1–6.
View ArticleResearch of Secure Communication of Esp32 IoT Embedded System to.NET Core...
Nikolov, Neven, Nakov, Ognyan. 2019. Research of Secure Communication of Esp32 IoT Embedded System to.NET Core Cloud Structure Using MQTTS SSL/TLS. 2019 IEEE XXVIII International Scientific...
View ArticleFeatures of Application of Data Transmission Protocols in Wireless Networks...
Belej, Olexander, Nestor, Natalia, Polotai, Orest, Sadeckii, Jan. 2019. Features of Application of Data Transmission Protocols in Wireless Networks of Sensors. 2019 3rd International Conference on...
View ArticleAuthentication Protocols Based on One-Time Passwords
Babkin, Sergey, Epishkina, Anna. 2019. Authentication Protocols Based on One-Time Passwords. 2019 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus)....
View ArticleCAN Radar: Sensing Physical Devices in CAN Networks based on Time Domain...
Rumez, Marcel, Dürrwang, Jürgen, Brecht, Tim, Steinshorn, Timo, Neugebauer, Peter, Kriesten, Reiner, Sax, Eric. 2019. CAN Radar: Sensing Physical Devices in CAN Networks based on Time Domain...
View ArticleDecentralized Identifier Distribution for Moving Target Defense and Beyond
Krohmer, D., Schotten, H. D.. 2020. Decentralized Identifier Distribution for Moving Target Defense and Beyond. 2020 International Conference on Cyber Situational Awareness, Data Analytics and...
View ArticleResearch of MQTT, CoAP, HTTP and XMPP IoT Communication protocols for...
Nikolov, N.. 2020. Research of MQTT, CoAP, HTTP and XMPP IoT Communication protocols for Embedded Systems. 2020 XXIX International Scientific Conference Electronics (ET). :1—4.
View ArticleAn Enhanced and Secure Multiserver-based User Authentication Protocol
Hassan, Mehmood, Sultan, Aiman, Awan, Ali Afzal, Tahir, Shahzaib, Ihsan, Imran. 2020. An Enhanced and Secure Multiserver-based User Authentication Protocol. 2020 International Conference on Cyber...
View ArticleSecurity Analysis on an Efficient and Provably Secure Authenticated Key...
Shamshad, Salman, Obaidat, Mohammad S., Minahil, Saleem, Muhammad Asad, Shamshad, Usman, Mahmood, Khalid. 2021. Security Analysis on an Efficient and Provably Secure Authenticated Key Agreement...
View ArticleData Obfuscation Technique in Cloud Security
Enireddy, Vamsidhar, Somasundaram, K., Mahesh M, P. C. Senthil, Ramkumar Prabhu, M., Babu, D. Vijendra, C, Karthikeyan.. 2021. Data Obfuscation Technique in Cloud Security. 2021 2nd International...
View ArticleAnalysis of information security in the PoW (Proof of Work) and PoS (Proof of...
Chicaiza, Silvana Abigail Yacchirema, Chafla, Ciro Napoleon Saguay, Álvarez, Luis Fernando Enriquez, Matute, Polo Fabian Iñiguez, Rodriguez, Ramiro Delgado. 2021. Analysis of information security in...
View ArticleOn the Security of Authenticated Key Agreement Scheme for Fog-driven IoT...
Shamshad, Salman, Obaidat, Mohammad S., Minahil, Shamshad, Usman, Noor, Sahar, Mahmood, Khalid. 2021. On the Security of Authenticated Key Agreement Scheme for Fog-driven IoT Healthcare System. 2021...
View Article