A fundamental problem in security is authentication: namely, how to verify the identity of another party. Without this verification, the ideas of privacy and integrity are moot. Modern authentication techniques use cryptographic operations that secure the system against adversaries that do not have tremendous amounts of computation and memory. However, when the abilities of the adversary increase, such authentication paradigms become more susceptible to defeat. With the greater threat of defeat, the secret authentication keys must be replaced more often. Unfortunately, the popular key replacement algorithms typically rely on either third parties or on non-trivial computational ability. In this thesis we attack these two aspects of the...
In this dissertation, we propose the use of adversarial machine learning to characterize wireless ra...
Authentication protocol is a critical part of any application to manage the access control in many a...
In the modern technological world, the existence of minuscule devices that are able to exchange data...
A fundamental problem in security is authentication: namely, how to verify the identity of another p...
The use of wireless networks for communication has grown significantly in recent times, and continue...
As an alternative and appealing approach to providing information security in wireless communication...
The popularity of personal computing devices (e.g. smart cards) exposes users to risks, notably iden...
Authentication is a critical issue in wireless communication due to the impersonation and substituti...
Lightweight physical layer security schemes that have recently attracted a lot of attention include ...
Due to the open nature of radio propagation, information security in wireless communications has bee...
While the open nature of radio propagation enables convenient "anywhere" wireless access, it becomes...
Establishing a secret communication between two parties requires both legal parties to share a priva...
This is an editorialInternational audienceThe ongoing paradigm shift from classical centralized wire...
The topic of physical layer authenticated encryption using high rate key generation through shared r...
With the advancement in Internet-based technologies, network applications are no longer just limited...
In this dissertation, we propose the use of adversarial machine learning to characterize wireless ra...
Authentication protocol is a critical part of any application to manage the access control in many a...
In the modern technological world, the existence of minuscule devices that are able to exchange data...
A fundamental problem in security is authentication: namely, how to verify the identity of another p...
The use of wireless networks for communication has grown significantly in recent times, and continue...
As an alternative and appealing approach to providing information security in wireless communication...
The popularity of personal computing devices (e.g. smart cards) exposes users to risks, notably iden...
Authentication is a critical issue in wireless communication due to the impersonation and substituti...
Lightweight physical layer security schemes that have recently attracted a lot of attention include ...
Due to the open nature of radio propagation, information security in wireless communications has bee...
While the open nature of radio propagation enables convenient "anywhere" wireless access, it becomes...
Establishing a secret communication between two parties requires both legal parties to share a priva...
This is an editorialInternational audienceThe ongoing paradigm shift from classical centralized wire...
The topic of physical layer authenticated encryption using high rate key generation through shared r...
With the advancement in Internet-based technologies, network applications are no longer just limited...
In this dissertation, we propose the use of adversarial machine learning to characterize wireless ra...
Authentication protocol is a critical part of any application to manage the access control in many a...
In the modern technological world, the existence of minuscule devices that are able to exchange data...