Survey on the authentication and key agreement of 6LoWPAN: Open issues and future direction

FF Ashrif, EA Sundararajan, R Ahmad… - Journal of Network and …, 2024 - Elsevier
The advent of the Internet of Things (IoT) technology and the term “connect everything to
everything” bring up a new standard for IPv6 over Low-power Wireless Personal Area …

Secure coding practices in java: Challenges and vulnerabilities

N Meng, S Nagy, D Yao, W Zhuang… - Proceedings of the 40th …, 2018 - dl.acm.org
The Java platform and its third-party libraries provide useful features to facilitate secure
coding. However, misusing them can cost developers time and effort, as well as introduce …

Unveiling the mystery of internet packet forwarding: A survey of network path validation

K Bu, A Laird, Y Yang, L Cheng, J Luo, Y Li… - ACM Computing Surveys …, 2020 - dl.acm.org
Validating the network paths taken by packets is critical in constructing a secure Internet
architecture. Any feasible solution must both enforce packet forwarding along end-host …

Towards a formal foundation of web security

D Akhawe, A Barth, PE Lam, J Mitchell… - 2010 23rd IEEE …, 2010 - ieeexplore.ieee.org
We propose a formal model of web security based on an abstraction of the web platform and
use this model to analyze the security of several sample web mechanisms and applications …

[LIVRE][B] Security properties

C Cremers, S Mauw, C Cremers, S Mauw - 2012 - Springer
Security Properties | SpringerLink Skip to main content Advertisement SpringerLink Account
Menu Find a journal Publish with us Track your research Search Cart Book cover …

Refinement types for secure implementations

J Bengtson, K Bhargavan, C Fournet… - ACM Transactions on …, 2011 - dl.acm.org
We present the design and implementation of a typechecker for verifying security properties
of the source code of cryptographic protocols and access control mechanisms. The …

Why does cryptographic software fail? A case study and open problems

D Lazar, H Chen, X Wang, N Zeldovich - … of 5th Asia-Pacific Workshop on …, 2014 - dl.acm.org
Mistakes in cryptographic software implementations often undermine the strong security
guarantees offered by cryptography. This paper presents a systematic study of cryptographic …

The foundational cryptography framework

A Petcher, G Morrisett - Principles of Security and Trust: 4th International …, 2015 - Springer
Abstract We present the Foundational Cryptography Framework (FCF) for develo** and
checking complete proofs of security for cryptographic schemes within a proof assistant. This …

A mutual authentication and key establishment scheme for M2M communication in 6LoWPAN networks

Y Qiu, M Ma - IEEE transactions on industrial informatics, 2016 - ieeexplore.ieee.org
The machine-to-machine (M2M) communication, which plays a vital role in the Internet of
Things (IoT), allows wireless and wired systems to monitor environments and exchange the …

A survey of symbolic methods in computational analysis of cryptographic systems

V Cortier, S Kremer, B Warinschi - Journal of Automated Reasoning, 2011 - Springer
Since the 1980s, two approaches have been developed for analyzing security protocols.
One of the approaches relies on a computational model that considers issues of complexity …