[HTML][HTML] IoT security challenges: cloud and blockchain, postquantum cryptography, and evolutionary techniques

S Balogh, O Gallo, R Ploszek, P Špaček, P Zajac - Electronics, 2021 - mdpi.com
Internet of Things connects the physical and cybernetic world. As such, security issues of IoT
devices are especially damaging and need to be addressed. In this treatise, we overview …

A comprehensive survey on the cyber-security of smart grids: Cyber-attacks, detection, countermeasure techniques, and future directions

TT Khoei, HO Slimane, N Kaabouch - arXiv preprint arXiv:2207.07738, 2022 - arxiv.org
One of the significant challenges that smart grid networks face is cyber-security. Several
studies have been conducted to highlight those security challenges. However, the majority …

[HTML][HTML] A new quantum-safe multivariate polynomial public key digital signature algorithm

R Kuang, M Perepechaenko, M Barbeau - Scientific Reports, 2022 - nature.com
We propose a new quantum-safe digital signature algorithm called Multivariate Polynomial
Public Key Digital Signature (MPPK/DS). The core of the algorithm is based on the modular …

Quantum permutation pad for universal quantum-safe cryptography

R Kuang, M Barbeau - Quantum Information Processing, 2022 - Springer
Classical cryptographic techniques are currently under the growing quantum computing
threat. New techniques that quantum computing algorithms cannot break are urgently …

Sok: Safer digital-safety research involving at-risk users

R Bellini, E Tseng, N Warford, A Daffalla… - arXiv preprint arXiv …, 2023 - arxiv.org
Research involving at-risk users--that is, users who are more likely to experience a digital
attack or to be disproportionately affected when harm from such an attack occurs--can pose …

Cybersafe Capabilities and Utilities for Smart Cities

K Kalinaki, NN Thilakarathne, HR Mubarak… - Cybersecurity for Smart …, 2023 - Springer
From the beginning of the 21st century, the entire world suffers from two critical problems:
the growth of the world population and the improvement of life expectancy of people owing …

SoK: Password-Authenticated Key Exchange--Theory, Practice, Standardization and Real-World Lessons

F Hao, PC van Oorschot - Proceedings of the 2022 ACM on Asia …, 2022 - dl.acm.org
Password-authenticated key exchange (PAKE) is a major area of cryptographic protocol
research and practice. Many PAKE proposals have emerged in the 30 years following the …

Neural tangent kernel empowered federated learning

K Yue, R Jin, R Pilgrim, CW Wong… - International …, 2022 - proceedings.mlr.press
Federated learning (FL) is a privacy-preserving paradigm where multiple participants jointly
solve a machine learning problem without sharing raw data. Unlike traditional distributed …

Is real-time phishing eliminated with {FIDO}? social engineering downgrade attacks against {FIDO} protocols

E Ulqinaku, H Assal, AR Abdou, S Chiasson… - 30th USENIX Security …, 2021 - usenix.org
FIDO's U2F is a web-authentication mechanism designed to mitigate real-time phishing—an
attack that undermines multi-factor authentication by allowing an attacker to relay second …

Empirical analysis and privacy implications in OAuth-based single sign-on systems

SG Morkonda, S Chiasson… - Proceedings of the 20th …, 2021 - dl.acm.org
Single sign-on authentication systems such as OAuth 2.0 are widely used in web services.
They allow users to use accounts registered with major identity providers such as Google …