Security and privacy threats for bluetooth low energy in iot and wearable devices: A comprehensive survey
A Barua, MA Al Alamin, MS Hossain… - IEEE Open Journal of …, 2022 - ieeexplore.ieee.org
Bluetooth Low Energy (BLE) has become the de facto communication protocol for the
Internet of Things (IoT) and smart wearable devices for its ultra-low energy consumption …
Internet of Things (IoT) and smart wearable devices for its ultra-low energy consumption …
Man-in-the-middle in tunnelled authentication protocols
Deploying a new security protocol is expensive. This encourages system designers to look
for ways of re-using existing infrastructure. When security protocols and components are re …
for ways of re-using existing infrastructure. When security protocols and components are re …
A Tutorial-Style Introduction to
K Bhargavan, A Bichhawat, QH Do, P Hosseyni… - Protocols, Strands, and …, 2021 - Springer
DY⋆ is a recently proposed formal verification framework for the symbolic security analysis
of cryptographic protocol code written in the F⋆ programming language. Unlike automated …
of cryptographic protocol code written in the F⋆ programming language. Unlike automated …
Watermarking protocol for web context
F Frattolillo - IEEE Transactions on Information Forensics and …, 2007 - ieeexplore.ieee.org
Digital watermarking is considered to be a main technology for the copyright protection of
multimedia digital content distributed on the Internet. However, watermarking procedures …
multimedia digital content distributed on the Internet. However, watermarking procedures …
Engineering security-aware control applications for data authentication in smart industrial cyber–physical systems
The massive proliferation of sophisticated technologies into the heart of traditional Industrial
Control Systems has given birth to “smart Industrial Cyber–Physical Systems”(ICPS). While …
Control Systems has given birth to “smart Industrial Cyber–Physical Systems”(ICPS). While …
Scalable parallel graph partitioning
S Kirmani, P Raghavan - Proceedings of the international conference on …, 2013 - dl.acm.org
We consider partitioning a graph in parallel using a large number of processors. Parallel
multilevel partitioners, such as Pt-Scotch and ParMetis, produce good quality partitions but …
multilevel partitioners, such as Pt-Scotch and ParMetis, produce good quality partitions but …
[PDF][PDF] Developing a New Security Framework for Bluetooth Low Energy Devices.
Q Zhang, Z Liang, Z Cai - Computers, Materials & Continua, 2019 - cdn.techscience.cn
Wearable devices are becoming more popular in our daily life. They are usually used to
monitor health status, track fitness data, or even do medical tests, etc. Since the wearable …
monitor health status, track fitness data, or even do medical tests, etc. Since the wearable …
The faithfulness of abstract protocol analysis: Message authentication
JD Guttman, FJ Thayer, LD Zuck - … of the 8th ACM Conference on …, 2001 - dl.acm.org
Dolev and Yao initiated an approach to studying cryptographic protocols which abstracts
from possible problems with the cryptography so as to focus on the structural aspects of the …
from possible problems with the cryptography so as to focus on the structural aspects of the …
A novel 3GPP SAE authentication and key agreement protocol
Y Deng, H Fu, X Xie, J Zhou… - 2009 IEEE International …, 2009 - ieeexplore.ieee.org
This paper first analyzes authentication and key agreement protocol adopted by 3rd
generation partnership project (3GPP) system architecture evolution (SAE) release 8 …
generation partnership project (3GPP) system architecture evolution (SAE) release 8 …
[PDF][PDF] 基于认证测试的安全协议分析
杨明, 罗军舟 - 2006 - jos.org.cn
认证测试是一种新型的在Strand 空间模型基础上发展而来的安全协议分析与辅助设计技术,
可用于大部分协议的关联属性的分析; 但是与Strand 空间模型一样, 它主要用于协议正确性证明 …
可用于大部分协议的关联属性的分析; 但是与Strand 空间模型一样, 它主要用于协议正确性证明 …