Security and privacy-preserving challenges of e-health solutions in cloud computing

S Chenthara, K Ahmed, H Wang, F Whittaker - IEEE access, 2019 - ieeexplore.ieee.org
A systematic and comprehensive review of security and privacy-preserving challenges in e-
health solutions indicates various privacy preserving approaches to ensure privacy and …

Key reinstallation attacks: Forcing nonce reuse in WPA2

M Vanhoef, F Piessens - Proceedings of the 2017 ACM SIGSAC …, 2017 - dl.acm.org
We introduce the key reinstallation attack. This attack abuses design or implementation
flaws in cryptographic protocols to reinstall an already-in-use key. This resets the key's …

Triple handshakes and cookie cutters: Breaking and fixing authentication over TLS

K Bhargavan, AD Lavaud, C Fournet… - … IEEE Symposium on …, 2014 - ieeexplore.ieee.org
TLS was designed as a transparent channel abstraction to allow developers with no
cryptographic expertise to protect their application against attackers that may control some …

Rogue access point detection: Taxonomy, challenges, and future directions

B Alotaibi, K Elleithy - Wireless Personal Communications, 2016 - Springer
Abstract Wireless Local Area Networks (WLANs) are increasingly integrated into our daily
lives. Access Points (APs) are an integral part of the WLAN infrastructure, as they are …

Very fast containment of scanning worms, revisited

N Weaver, S Staniford, V Paxson - Malware Detection, 2007 - Springer
Computer worms—malicious, self-propagating programs—represent a significant threat to
large networks. One possible defense, containment, seeks to limit a worm's spread by …

Administration of wireless local area networks

N Asokan, P Ginzboorg, S Moloney… - US Patent …, 2013 - Google Patents
Methods and systems for managing access to a wireless local area network are provided. A
wireless access point (AP) may use a unified approach that utilizes an out-of-band channel …

Proving the TLS handshake secure (as it is)

K Bhargavan, C Fournet, M Kohlweiss, A Pironti… - Advances in Cryptology …, 2014 - Springer
Abstract The TLS Internet Standard features a mixed bag of cryptographic algorithms and
constructions, letting clients and servers negotiate their use for each run of the handshake …

Smart home-smartphone systems: Threats, security requirements and open research challenges

K Karimi, S Krit - 2019 International Conference of Computer …, 2019 - ieeexplore.ieee.org
Nowadays, home automation becomes part of people's daily life. Many people aim to control
their homes with a click on a smartphone but they are afraid to lose their confidentiality or …

Passive SSH Key Compromise via Lattices

K Ryan, K He, GA Sullivan, N Heninger - Proceedings of the 2023 ACM …, 2023 - dl.acm.org
We demonstrate that a passive network attacker can opportunistically obtain private RSA
host keys from an SSH server that experiences a naturally arising fault during signature …

Tunneling for transparency: A large-scale analysis of end-to-end violations in the internet

T Chung, D Choffnes, A Mislove - Proceedings of the 2016 Internet …, 2016 - dl.acm.org
Detecting violations of application-level end-to-end connectivity on the Internet is of
significant interest to researchers and end users; recent studies have revealed cases of …