[HTML][HTML] IoT security challenges: cloud and blockchain, postquantum cryptography, and evolutionary techniques
Internet of Things connects the physical and cybernetic world. As such, security issues of IoT
devices are especially damaging and need to be addressed. In this treatise, we overview …
devices are especially damaging and need to be addressed. In this treatise, we overview …
A comprehensive survey on the cyber-security of smart grids: Cyber-attacks, detection, countermeasure techniques, and future directions
One of the significant challenges that smart grid networks face is cyber-security. Several
studies have been conducted to highlight those security challenges. However, the majority …
studies have been conducted to highlight those security challenges. However, the majority …
[HTML][HTML] A new quantum-safe multivariate polynomial public key digital signature algorithm
We propose a new quantum-safe digital signature algorithm called Multivariate Polynomial
Public Key Digital Signature (MPPK/DS). The core of the algorithm is based on the modular …
Public Key Digital Signature (MPPK/DS). The core of the algorithm is based on the modular …
Quantum permutation pad for universal quantum-safe cryptography
Classical cryptographic techniques are currently under the growing quantum computing
threat. New techniques that quantum computing algorithms cannot break are urgently …
threat. New techniques that quantum computing algorithms cannot break are urgently …
Sok: Safer digital-safety research involving at-risk users
Research involving at-risk users--that is, users who are more likely to experience a digital
attack or to be disproportionately affected when harm from such an attack occurs--can pose …
attack or to be disproportionately affected when harm from such an attack occurs--can pose …
Cybersafe Capabilities and Utilities for Smart Cities
From the beginning of the 21st century, the entire world suffers from two critical problems:
the growth of the world population and the improvement of life expectancy of people owing …
the growth of the world population and the improvement of life expectancy of people owing …
SoK: Password-Authenticated Key Exchange--Theory, Practice, Standardization and Real-World Lessons
F Hao, PC van Oorschot - Proceedings of the 2022 ACM on Asia …, 2022 - dl.acm.org
Password-authenticated key exchange (PAKE) is a major area of cryptographic protocol
research and practice. Many PAKE proposals have emerged in the 30 years following the …
research and practice. Many PAKE proposals have emerged in the 30 years following the …
Neural tangent kernel empowered federated learning
Federated learning (FL) is a privacy-preserving paradigm where multiple participants jointly
solve a machine learning problem without sharing raw data. Unlike traditional distributed …
solve a machine learning problem without sharing raw data. Unlike traditional distributed …
Is real-time phishing eliminated with {FIDO}? social engineering downgrade attacks against {FIDO} protocols
FIDO's U2F is a web-authentication mechanism designed to mitigate real-time phishing—an
attack that undermines multi-factor authentication by allowing an attacker to relay second …
attack that undermines multi-factor authentication by allowing an attacker to relay second …
Empirical analysis and privacy implications in OAuth-based single sign-on systems
SG Morkonda, S Chiasson… - Proceedings of the 20th …, 2021 - dl.acm.org
Single sign-on authentication systems such as OAuth 2.0 are widely used in web services.
They allow users to use accounts registered with major identity providers such as Google …
They allow users to use accounts registered with major identity providers such as Google …