A survey of subscription privacy on the 5G radio interface-the past, present and future

H Khan, KM Martin - Journal of Information Security and Applications, 2020 - Elsevier
End-user privacy in mobile telephony systems is nowadays of great interest because of the
envisaged hyper-connectivity and the potential of the unprecedented services (virtual reality …

A billion open interfaces for eve and mallory:{MitM},{DoS}, and tracking attacks on {iOS} and {macOS} through apple wireless direct link

M Stute, S Narain, A Mariotto, A Heinrich… - 28th USENIX Security …, 2019 - usenix.org
Apple Wireless Direct Link (AWDL) is a key protocol in Apple's ecosystem used by over one
billion iOS and macOS devices for device-to-device communications. AWDL is a proprietary …

[HTML][HTML] An enhanced symmetric-key based 5G-AKA protocol

J Munilla, M Burmester, R Barco - Computer Networks, 2021 - Elsevier
Abstract 5G technology is called to support the next generation of wireless communications
and realize the “Internet of Everything” through its mMTC (massive Machine-Type …

Information systems security practices in social software applications: A systematic literature review

SI Tamrin, AA Norman, S Hamid - Aslib Journal of Information …, 2017 - emerald.com
Purpose The purpose of this paper to investigate the current information systems security
(ISS) practices of the social software application (SSA) users via the internet …

Imsi catcher detection method for cellular networks

H Alrashede, RA Shaikh - 2019 2nd International Conference …, 2019 - ieeexplore.ieee.org
Mobile communications are not trustful as many people think about it. The IMSI catcher
device is one of the most effective threats that can compromise the security of mobile …

5g early data transmission (rel-16): Security review and open issues

D Segura, J Munilla, EJ Khatib, R Barco - IEEE Access, 2022 - ieeexplore.ieee.org
The fifth-generation technology is called to support the next generation of wireless services
and realize the “Internet of Everything” through Machine-Type Communications and Cellular …

A Probabilistic Logic for Concrete Security

D Baelde, C Fontaine, A Koutsos, G Scerri, T Vignon - CSF 2024-, 2024 - hal.science
The Squirrel Prover is a proof assistant designed for the computational verification of
cryptographic protocols. It implements a probabilistic logic that captures cryptographic and …

[PDF][PDF] Epistemic Model Checking for Privacy

F Rajaona, I Boureanu, R Ramanujam… - 2024 IEEE 37th …, 2024 - people.itcarlson.com
We define an epistemic logic or logic of knowledge, PL, and a formalism to undertake
privacy-centric reasoning in security protocols, over a Dolev-Yao model. We are able to …

Privacy in Speech Technology

T Bäckström - arXiv preprint arXiv:2305.05227, 2023 - arxiv.org
Speech technology for communication, accessing information and services has rapidly
improved in quality. It is convenient and appealing because speech is the primary mode of …

[HTML][HTML] Behavioural verification: Preventing report fraud in decentralized advert distribution systems

SS Mamais, G Theodorakopoulos - Future Internet, 2017 - mdpi.com
Service commissions, which are claimed by Ad-Networks and Publishers, are susceptible to
forgery as non-human operators are able to artificially create fictitious traffic on digital …