research
          
      
      ∙
      01/20/2021
    The (in)security of some recently proposed lightweight key distribution schemes
Two recently published papers propose some very simple key distribution ...
          
            research
          
      
      ∙
      09/19/2020
    An insecure noninteractive group key establishment scheme
A serious weakness in the recently proposed Chen-Hsu-Harn group authenti...
          
            research
          
      
      ∙
      05/11/2020
    Provably insecure group authentication: Not all security proofs are what they claim to be
A paper presented at the ICICS 2019 conference describes what is claimed...
          
            research
          
      
      ∙
      05/09/2020
    How not to secure wireless sensor networks revisited: Even if you say it twice it's still not secure
Two recent papers describe almost exactly the same group key establishme...
          
            research
          
      
      ∙
      05/02/2020
    Who Needs Trust for 5G?
There has been much recent discussion of the criticality of the 5G infra...
          
            research
          
      
      ∙
      04/12/2020
    How not to secure wireless sensor networks: A plethora of insecure polynomial-based key pre-distribution schemes
Three closely-related polynomial-based group key pre-distribution scheme...
          
            research
          
      
      ∙
      04/12/2020
    The Albakri-Harn key pre-distribution scheme is insecure
The Albakri-Harn group key pre-distribution protocol, which enables any ...
          
            research
          
      
      ∙
      03/31/2020
    Yet another insecure group key distribution scheme using secret sharing
A recently proposed group key distribution scheme known as UMKESS, based...
          
            research
          
      
      ∙
      11/18/2019
    The impact of quantum computing on real-world security: A 5G case study
This paper provides a detailed analysis of the impact of quantum computi...
          
            research
          
      
      ∙
      06/21/2019
    The Saeed-Liu-Tian-Gao-Li authenticated key agreement protocol is insecure
A recently proposed authenticated key agreement protocol is shown to be ...
          
            research
          
      
      ∙
      05/23/2019
    Beyond Cookie Monster Amnesia: Real World Persistent Online Tracking
Browser fingerprinting is a relatively new method of uniquely identifyin...
          
            research
          
      
      ∙
      01/24/2019
    OAuthGuard: Protecting User Security and Privacy with OAuth 2.0 and OpenID Connect
Millions of users routinely use Google to log in to websites supporting ...
          
            research
          
      
      ∙
      03/14/2018
    The Hsu-Harn-Mu-Zhang-Zhu group key establishment protocol is insecure
A significant security vulnerability in a recently published group key e...
          
            research
          
      
      ∙
      03/03/2018
    Security issues in a group key establishment protocol
Major shortcomings in a recently published group key establishment proto...
          
            research
          
      
      ∙
      01/24/2018
    Mitigating CSRF attacks on OAuth 2.0 and OpenID Connect
Many millions of users routinely use their Google, Facebook and Microsof...
          
            research
          
      
      ∙
      01/20/2018
     
             
  
  
     
                             share
 share