research
∙
01/20/2021
The (in)security of some recently proposed lightweight key distribution schemes
Two recently published papers propose some very simple key distribution ...
research
∙
09/19/2020
An insecure noninteractive group key establishment scheme
A serious weakness in the recently proposed Chen-Hsu-Harn group authenti...
research
∙
05/11/2020
Provably insecure group authentication: Not all security proofs are what they claim to be
A paper presented at the ICICS 2019 conference describes what is claimed...
research
∙
05/09/2020
How not to secure wireless sensor networks revisited: Even if you say it twice it's still not secure
Two recent papers describe almost exactly the same group key establishme...
research
∙
05/02/2020
Who Needs Trust for 5G?
There has been much recent discussion of the criticality of the 5G infra...
research
∙
04/12/2020
How not to secure wireless sensor networks: A plethora of insecure polynomial-based key pre-distribution schemes
Three closely-related polynomial-based group key pre-distribution scheme...
research
∙
04/12/2020
The Albakri-Harn key pre-distribution scheme is insecure
The Albakri-Harn group key pre-distribution protocol, which enables any ...
research
∙
03/31/2020
Yet another insecure group key distribution scheme using secret sharing
A recently proposed group key distribution scheme known as UMKESS, based...
research
∙
11/18/2019
The impact of quantum computing on real-world security: A 5G case study
This paper provides a detailed analysis of the impact of quantum computi...
research
∙
06/21/2019
The Saeed-Liu-Tian-Gao-Li authenticated key agreement protocol is insecure
A recently proposed authenticated key agreement protocol is shown to be ...
research
∙
05/23/2019
Beyond Cookie Monster Amnesia: Real World Persistent Online Tracking
Browser fingerprinting is a relatively new method of uniquely identifyin...
research
∙
01/24/2019
OAuthGuard: Protecting User Security and Privacy with OAuth 2.0 and OpenID Connect
Millions of users routinely use Google to log in to websites supporting ...
research
∙
03/14/2018
The Hsu-Harn-Mu-Zhang-Zhu group key establishment protocol is insecure
A significant security vulnerability in a recently published group key e...
research
∙
03/03/2018
Security issues in a group key establishment protocol
Major shortcomings in a recently published group key establishment proto...
research
∙
01/24/2018
Mitigating CSRF attacks on OAuth 2.0 and OpenID Connect
Many millions of users routinely use their Google, Facebook and Microsof...
research
∙
01/20/2018