Edge computing security: State of the art and challenges

Y **ao, Y Jia, C Liu, X Cheng, J Yu… - Proceedings of the …, 2019 - ieeexplore.ieee.org
The rapid developments of the Internet of Things (IoT) and smart mobile devices in recent
years have been dramatically incentivizing the advancement of edge computing. On the one …

A survey of communication protocols for internet of things and related challenges of fog and cloud computing integration

J Dizdarević, F Carpio, A Jukan… - ACM Computing Surveys …, 2019 - dl.acm.org
The fast increment in the number of IoT (Internet of Things) devices is accelerating the
research on new solutions to make cloud services scalable. In this context, the novel …

A formal analysis of 5G authentication

D Basin, J Dreier, L Hirschi, S Radomirovic… - Proceedings of the …, 2018 - dl.acm.org
Mobile communication networks connect much of the world's population. The security of
users' calls, SMSs, and mobile data depends on the guarantees provided by the …

SoK: Computer-aided cryptography

M Barbosa, G Barthe, K Bhargavan… - … IEEE symposium on …, 2021 - ieeexplore.ieee.org
Computer-aided cryptography is an active area of research that develops and applies
formal, machine-checkable approaches to the design, analysis, and implementation of …

A comprehensive symbolic analysis of TLS 1.3

C Cremers, M Horvat, J Hoyland, S Scott… - Proceedings of the …, 2017 - dl.acm.org
The TLS protocol is intended to enable secure end-to-end communication over insecure
networks, including the Internet. Unfortunately, this goal has been thwarted a number of …

OPAQUE: an asymmetric PAKE protocol secure against pre-computation attacks

S Jarecki, H Krawczyk, J Xu - … 37th Annual International Conference on the …, 2018 - Springer
Abstract Password-Authenticated Key Exchange (PAKE) protocols allow two parties that
only share a password to establish a shared key in a way that is immune to offline attacks …

The Complete Guide to SCION

L Chuat, M Legner, D Basin, D Hausheer, S Hitz… - Information Security and …, 2022 - Springer
The first SCION book, published in 2017, summarized the results of eight years of work by
over a dozen researchers. Now, five years later, we have completely rewritten the book. It …

[ΒΙΒΛΙΟ][B] Protocols for authentication and key establishment

C Boyd, A Mathuria, D Stebila - 2003 - Springer
The first edition of this book was published in 2003. Inevitably, certain parts of the book
became outdated quickly. At the same time new developments have continued apace …

The applied pi calculus: Mobile values, new names, and secure communication

M Abadi, B Blanchet, C Fournet - Journal of the ACM (JACM), 2017 - dl.acm.org
We study the interaction of the programming construct “new,” which generates statically
scoped names, with communication via messages on channels. This interaction is crucial in …

[PDF][PDF] ProVerif 2.00: automatic cryptographic protocol verifier, user manual and tutorial

B Blanchet, B Smyth, V Cheval… - Version from, 2018 - bblanche.gitlabpages.inria.fr
This manual describes the ProVerif software package version 2.05. ProVerif is a tool for
automatically analyzing the security of cryptographic protocols. Support is provided for, but …