Symbolic security protocol verifiers have reached a high degree of automation and maturity. Today, experts can model real-world protocols, but this often requires model-specific …
C Jacomme, S Kremer - ACM Transactions on Privacy and Security …, 2021 - dl.acm.org
Passwords are still the most widespread means for authenticating users, even though they have been shown to create huge security problems. This motivated the use of additional …
5G has been under standardization for over a decade and will drive the world's mobile technologies in the decades to come. One of the cornerstones of the 5G standard is its …
M Shi, J Chen, K He, H Zhao, M Jia, R Du - 32nd USENIX Security …, 2023 - usenix.org
Bluetooth Low Energy (BLE) is the mainstream Bluetooth standard and BLE Secure Connections (BLC-SC) pairing is a protocol that authenticates two Bluetooth devices and …
Background The number of reported public sector information security incidents has significantly increased recently including 22% related to the UK health sector. Over two …
C Zhang, T Saluja, R Meira-Góes… - 2023 IEEE/ACM 45th …, 2023 - ieeexplore.ieee.org
Modern software systems are deployed in a highly dynamic, uncertain environment. Ideally, a system that is robust should be capable of establishing its most critical requirements even …
T Yang, S Wang, B Zhan, N Zhan, J Li, S Xiang… - Journal of Systems …, 2022 - Elsevier
Security and privacy of users' information in mobile communication networks have drawn increasing attention. The development of 5G system has demanded new protocols to realize …
Abstract Socio-Technical Systems (STSs) combine the operations of technical systems with the choices and intervention of humans, namely the users of the technical systems …
In random sample voting, only a randomly chosen subset of all eligible voters are selected to vote. This poses new security challenges for the voting protocol used. In particular, one must …