Security and privacy threats for bluetooth low energy in iot and wearable devices: A comprehensive survey

A Barua, MA Al Alamin, MS Hossain… - IEEE Open Journal of …, 2022 - ieeexplore.ieee.org
Bluetooth Low Energy (BLE) has become the de facto communication protocol for the
Internet of Things (IoT) and smart wearable devices for its ultra-low energy consumption …

Man-in-the-middle in tunnelled authentication protocols

N Asokan, V Niemi, K Nyberg - International Workshop on Security …, 2003 - Springer
Deploying a new security protocol is expensive. This encourages system designers to look
for ways of re-using existing infrastructure. When security protocols and components are re …

A Tutorial-Style Introduction to

K Bhargavan, A Bichhawat, QH Do, P Hosseyni… - Protocols, Strands, and …, 2021 - Springer
DY⋆ is a recently proposed formal verification framework for the symbolic security analysis
of cryptographic protocol code written in the F⋆ programming language. Unlike automated …

Watermarking protocol for web context

F Frattolillo - IEEE Transactions on Information Forensics and …, 2007 - ieeexplore.ieee.org
Digital watermarking is considered to be a main technology for the copyright protection of
multimedia digital content distributed on the Internet. However, watermarking procedures …

Engineering security-aware control applications for data authentication in smart industrial cyber–physical systems

B Genge, P Haller, AV Duka - Future Generation Computer Systems, 2019 - Elsevier
The massive proliferation of sophisticated technologies into the heart of traditional Industrial
Control Systems has given birth to “smart Industrial Cyber–Physical Systems”(ICPS). While …

Scalable parallel graph partitioning

S Kirmani, P Raghavan - Proceedings of the international conference on …, 2013 - dl.acm.org
We consider partitioning a graph in parallel using a large number of processors. Parallel
multilevel partitioners, such as Pt-Scotch and ParMetis, produce good quality partitions but …

[PDF][PDF] Developing a New Security Framework for Bluetooth Low Energy Devices.

Q Zhang, Z Liang, Z Cai - Computers, Materials & Continua, 2019 - cdn.techscience.cn
Wearable devices are becoming more popular in our daily life. They are usually used to
monitor health status, track fitness data, or even do medical tests, etc. Since the wearable …

The faithfulness of abstract protocol analysis: Message authentication

JD Guttman, FJ Thayer, LD Zuck - … of the 8th ACM Conference on …, 2001 - dl.acm.org
Dolev and Yao initiated an approach to studying cryptographic protocols which abstracts
from possible problems with the cryptography so as to focus on the structural aspects of the …

A novel 3GPP SAE authentication and key agreement protocol

Y Deng, H Fu, X Xie, J Zhou… - 2009 IEEE International …, 2009 - ieeexplore.ieee.org
This paper first analyzes authentication and key agreement protocol adopted by 3rd
generation partnership project (3GPP) system architecture evolution (SAE) release 8 …

[PDF][PDF] 基于认证测试的安全协议分析

杨明, 罗军舟 - 2006 - jos.org.cn
认证测试是一种新型的在Strand 空间模型基础上发展而来的安全协议分析与辅助设计技术,
可用于大部分协议的关联属性的分析; 但是与Strand 空间模型一样, 它主要用于协议正确性证明 …