An overview of privacy and security issues in the internet of things

CM Medaglia, A Serbanati - The Internet of Things: 20 th Tyrrhenian …, 2010 - Springer
While the general definition of the Internet of Things (IoT) is almost mature, roughly defining
it as an information network connecting virtual and physical objects, there is a consistent …

A survey of IIoT protocols: A measure of vulnerability risk analysis based on CVSS

S Figueroa-Lorenzo, J Añorga… - ACM Computing Surveys …, 2020 - dl.acm.org
Industrial Internet of Things (IIoT) is present in many participants from the energy, health,
manufacturing, transport, and public sectors. Many factors catalyze IIoT, such as robotics …

[BOK][B] Deductive software verification-the key book

W Ahrendt, B Beckert, R Bubel, R Hähnle, PH Schmitt… - 2016 - Springer
• There are IDEs for KeY, including an Eclipse extension, that make it easy to keep track of
proof obligations in larger projects [Hentschel et al., 2014c].• A stripped down version of …

How to issue a central bank digital currency

D Chaum, C Grothoff, T Moser - arxiv preprint arxiv:2103.00254, 2021 - arxiv.org
With the emergence of Bitcoin and recently proposed stablecoins from BigTechs, such as
Diem (formerly Libra), central banks face growing competition from private actors offering …

Extending SAT solvers to cryptographic problems

M Soos, K Nohl, C Castelluccia - International Conference on Theory and …, 2009 - Springer
Cryptography ensures the confidentiality and authenticity of information but often relies on
unproven assumptions. SAT solvers are a powerful tool to test the hardness of certain …

RFID systems: research trends and challenges

M Bolic, D Simplot-Ryl, I Stojmenovic - 2010 - books.google.com
This book provides an insight into the'hot'field of Radio Frequency Identification (RFID)
Systems In this book, the authors provide an insight into the field of RFID systems with an …

Classifying RFID attacks and defenses

A Mitrokotsa, MR Rieback, AS Tanenbaum - Information Systems Frontiers, 2010 - Springer
Abstract RFID (Radio Frequency Identification) systems are one of the most pervasive
computing technologies with technical potential and profitable opportunities in a diverse …

Reverse fuzzy extractors: Enabling lightweight mutual authentication for PUF-enabled RFIDs

A Van Herrewege, S Katzenbeisser, R Maes… - … Cryptography and Data …, 2012 - Springer
RFID-based tokens are increasingly used in electronic payment and ticketing systems for
mutual authentication of tickets and terminals. These systems typically use cost-effective …

Advances in ultralightweight cryptography for low-cost RFID tags: Gossamer protocol

P Peris-Lopez, JC Hernandez-Castro… - … Workshop, WISA 2008 …, 2009 - Springer
The design of ultralightweight authentication protocols that conform to low-cost tag
requirements is imperative. This paper analyses the most important proposals (except for …

On the (in) security of the latest generation implantable cardiac defibrillators and how to secure them

E Marin, D Singelée, FD Garcia, T Chothia… - Proceedings of the …, 2016 - dl.acm.org
Implantable Medical Devices (IMDs) typically use proprietary protocols with no or limited
security to wirelessly communicate with a device programmer. These protocols enable …