Zobrazeno 1 - 10
of 10
pro vyhledávání: '"Mihai Ordean"'
Autor:
Sam L. Thomas, Jan Van den Herrewegen, Georgios Vasilakis, Zitai Chen, Mihai Ordean, Flavio D. Garcia
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2021, Iss 3 (2021)
Performing security analysis of embedded devices is a challenging task. They present many difficulties not usually found when analyzing commodity systems: undocumented peripherals, esoteric instruction sets, and limited tool support. Thus, a signific
Externí odkaz:
https://doaj.org/article/b318877ed997431fb02679555d4768c7
Voice over LTE (VoLTE) and Voice over NR (VoNR), are two similar technologies that have been widely deployed by operators to provide a better calling experience in LTE and 5G networks, respectively. The VoLTE/NR protocols rely on the security feature
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::c7fa9a5a948475e0f3b9e689629e0b74
http://arxiv.org/abs/2301.02487
http://arxiv.org/abs/2301.02487
Publikováno v:
EuroS&P
We provide a systematic analysis of two related multiparty protocols, namely (Non-Interactive Fully) Distributed Verifiable Random Functions (DVRFs) and Decentralised Random Beacons (DRBs), including their syntax and definition of robustness and priv
Autor:
Jan Van den Herrewegen, Mihai Ordean, Zitai Chen, Sam L. Thomas, Georgios Vasilakis, Flavio D. Garcia
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2021, Iss 3 (2021)
Performing security analysis of embedded devices is a challenging task. They present many difficulties not usually found when analyzing commodity systems: undocumented peripherals, esoteric instruction sets, and limited tool support. Thus, a signific
Publikováno v:
ACSAC
ACSAC 2017: 33rd Annual Computer Security Applications Conference, Orlando, FL, USA — December 04-08, 2017. Proceedings, 327-338. New York : ACM
STARTPAGE=327;ENDPAGE=338;TITLE=ACSAC 2017: 33rd Annual Computer Security Applications Conference, Orlando, FL, USA — December 04-08, 2017. Proceedings
ACSAC 2017: 33rd Annual Computer Security Applications Conference, Orlando, FL, USA — December 04-08, 2017. Proceedings, pp. 327-338
ACSAC 2017: 33rd Annual Computer Security Applications Conference, Orlando, FL, USA — December 04-08, 2017. Proceedings, 327-338. New York : ACM
STARTPAGE=327;ENDPAGE=338;TITLE=ACSAC 2017: 33rd Annual Computer Security Applications Conference, Orlando, FL, USA — December 04-08, 2017. Proceedings
ACSAC 2017: 33rd Annual Computer Security Applications Conference, Orlando, FL, USA — December 04-08, 2017. Proceedings, pp. 327-338
This paper presents a new Key Management and Distribution Scheme for use in the European Rail Traffic Management System (ERTMS). Its aim is to simplify key management and improve cross-border operations through hierarchical partitioning. The current
Autor:
Cliffe Schreuders, Z., Shaw, T., Shan-A-Khuda, M., Ravichandran, G., Keighley, J., Mihai Ordean
Publikováno v:
USENIX
Scopus-Elsevier
Scopus-Elsevier
Computer security students benefit from hands-on experience applying security tools and techniques to attack and defend vulnerable systems. Virtual machines (VMs) provide an effective way of sharing targets for hacking. However, developing these hack
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::c6178b5d9329cbfac3de8ab845ea2ba9
Publikováno v:
SACMAT
This paper proposes Concurrent-Access Obfuscated Store (CAOS), a construction for remote data storage that provides access-pattern obfuscation in a honest-but-curious adversarial model, while allowing for low bandwidth overhead and client storage. Co
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::8164b48ffb9b79d06583390ae649b400
Autor:
Mircea Giurgiu, Mihai Ordean
Publikováno v:
2012 10th International Symposium on Electronics and Telecommunications.
This paper presents the design concept for an authentication string that makes use of the server's public key and provides client's authenticity through its password without the need of a client side certificate or a second channel. Successful strate
Autor:
Karen Renaud, Mihai Ordean
Publikováno v:
2012 IEEE 8th International Conference on Intelligent Computer Communication and Processing.
In the last decade graphical passwords have been proposed as a viable alternative to the problematical password. One of the most popular of these is the recognition-based graphical password, where the user clicks secret images from one or more challe
Autor:
Mircea Giurgiu, Mihai Ordean
Publikováno v:
2010 9th International Symposium on Electronics and Telecommunications.
This article provides a systematic approach on how network applications with support for secure SSL/TLS protocols work. In order to illustrate the functionality and the development of such an application the framework functions and procedures will be