Modelling analysis and auto-detection of cryptographic misuse in android applications

S Shuai, D Guowei, G Tao… - 2014 IEEE 12th …, 2014 - ieeexplore.ieee.org
Cryptographic misuse affects a sizeable portion of Android applications. However, there is
only an empirical study that has been made about this problem. In this paper, we perform a …

Robust encryption method based on AES-CBC using elliptic curves Diffie–Hellman to secure data in wireless sensor networks

AFX Ametepe, ASRM Ahouandjinou, EC Ezin - Wireless Networks, 2022 - Springer
Secure data is a foremost topic in wireless sensor networks since data are transmitted
through wireless channels where attackers may get access to critical information …

Midgar: Study of communications security among Smart Objects using a platform of heterogeneous devices for the Internet of Things

G Sánchez-Arias, CG García, BCP G-Bustelo - Future Generation …, 2017 - Elsevier
In last years, the Internet of Things has been a revolution in terms of applications and
research. Currently, there are a great variety of nodes connected to each other to create …

E-passport: Cracking basic access control keys

Y Liu, T Kasper, K Lemke-Rust, C Paar - … 25-30, 2007, Proceedings, Part II, 2007 - Springer
Since the introduction of the Machine Readable Travel Document (MRTD) that is also known
as e-passport for human identification at border control debates have been raised about …

An embedded system for practical security analysis of contactless smartcards

T Kasper, D Carluccio, C Paar - … and Practices. Smart Cards, Mobile and …, 2007 - Springer
ISO 14443 compliant smartcards are widely-used in privacy and security sensitive
applications. Due to the contactless interface, they can be activated and read out from a …

E-passport: The global traceability or how to feel like a UPS package

D Carluccio, K Lemke-Rust, C Paar… - … Security Applications: 7th …, 2007 - Springer
Since the introduction of RFID technology there have been public debates on security and
privacy concerns. In this context the Machine Readable Travel Document (MRTD), also …

Bioinformatics applications on the FPGA-based high-performance computer RIVYERA

L Wienbrandt - High-performance computing using FPGAs, 2013 - Springer
Sequence alignment is one of the most popular application areas in bioinformatics.
Nowadays, the exponential growth of biological sequence data becomes a severe problem …

[PDF][PDF] Secure key storage and secure computation in Android

T Cooijmans, EE Poll, ERE Verheul… - Master's thesis, Radboud …, 2014 - cs.ru.nl
The increasing usage of smartphones also gains the interest of criminals who shift their
focus from attacking, for example, internet banking in a browser to attacking mobile banking …

Security analysis of the RaSTA safety protocol

M Heinrich, J Vieten, T Arul… - 2018 IEEE International …, 2018 - ieeexplore.ieee.org
RaSTA is a transport protocol that has been designed to be deployed in the safety-critical
domain of railway signalling. The protocol provides safety properties such as message …

High-performance cryptanalysis on RIVYERA and COPACOBANA computing systems

T Güneysu, T Kasper, M Novotný, C Paar… - High-Performance …, 2013 - Springer
Special-purpose computing platforms based on reconfigurable hardware have shown to
typically exhibit a much better performance-cost ratio than off-the-shelf computers populated …