K Kursawe, C Peters - 2015 10th International Conference on …, 2015 - ieeexplore.ieee.org
The Open Smart Grid Protocol (OSGP) is currently deployed in various countries in large- scale Smart Metering projects. The protocol was developed by the OSGP Alliance and …
R Bricout, S Murphy, KG Paterson… - Designs, Codes and …, 2018 - Springer
We explore the use of the Mantin biases (Mantin, Eurocrypt 2005) to recover plaintexts from RC4-encrypted traffic. We provide a more fine-grained analysis of these biases than in …
AF Doni, OAH Maria, S Hanif - Journal of Physics: Conference …, 2020 - iopscience.iop.org
Communication in the digital age plays an important role, a person can carry out various transactions or exchange data practically and quickly. So as to pose a great risk to …
A Dracinschi, S Fdida - … 25th Annual IEEE Conference on Local …, 2000 - ieeexplore.ieee.org
Increasing uncontrolled best-effort traffic deteriorates the ability of TCP to control congestion and is a source of high drop rates. This paper proposes an efficient congestion avoidance …
In the last few decades many aspects of our lives have been moved online. Banking and payments, health care, private messaging, or critical infrastructure monitoring are just a …
S Kumar - Proceedings of the 4th International Conference on …, 2016 - dl.acm.org
Random numbers are very important components in cyber security. A main application of random numbers is in the field of cryptography. PKI and TLS based encryption uses random …
KG Paterson, JCN Schuldt - Cryptography and Communications, 2018 - Springer
Levillain et al.(Asia CCS 2015) proposed two cookie masking methods, TLS Scramble and MCookies, to counter a class of attacks on SSL/TLS in which the attacker is able to exploit its …
1.1 Background Attacks against software are now major threats. In these attacks, the sensitive information can be leaked even if underlying cryptographic primitives are secure …
Cryptographic protocols are a critical element of the infrastructure for secure communication. They can be used to provide security guarantees for the exchanged data when multiple …