LEAP+ Efficient security mechanisms for large-scale distributed sensor networks

S Zhu, S Setia, S Jajodia - ACM Transactions on Sensor Networks …, 2006‏ - dl.acm.org
We describe LEAP+ (Localized Encryption and Authentication Protocol), a key management
protocol for sensor networks that is designed to support in-network processing, while at the …

{JEDI}:{Many-to-Many}{End-to-End} encryption and key delegation for {IoT}

S Kumar, Y Hu, MP Andersen, RA Popa… - 28th USENIX security …, 2019‏ - usenix.org
As the Internet of Things (IoT) emerges over the next decade, develo** secure
communication for IoT devices is of paramount importance. Achieving end-to-end encryption …

Practical short signature batch verification

AL Ferrara, M Green, S Hohenberger… - Cryptographers' Track at …, 2009‏ - Springer
In many applications, it is desirable to work with signatures that are short, and yet where
many messages from different signers be verified very quickly. RSA signatures satisfy the …

Mitigating DoS attacks against broadcast authentication in wireless sensor networks

P Ning, A Liu, W Du - ACM Transactions on Sensor Networks (TOSN), 2008‏ - dl.acm.org
Broadcast authentication is a critical security service in wireless sensor networks. There are
two general approaches for broadcast authentication in wireless sensor networks: digital …

Securing instrumented environments over content-centric networking: The case of lighting control and NDN

J Burke, P Gasti, N Nathan… - 2013 IEEE Conference on …, 2013‏ - ieeexplore.ieee.org
Instrumented environments, such as modern building automation systems (BAS), are
becoming commonplace and are increasingly interconnected with (and sometimes by) …

Droplet: Decentralized authorization and access control for encrypted data streams

H Shafagh, L Burkhalter, S Ratnasamy… - 29th USENIX Security …, 2020‏ - usenix.org
This paper presents Droplet, a decentralized data access control service. Droplet enables
data owners to securely and selectively share their encrypted data while guaranteeing data …

Nymble: Blocking misbehaving users in anonymizing networks

PP Tsang, A Kapadia, C Cornelius… - IEEE Transactions on …, 2009‏ - ieeexplore.ieee.org
Anonymizing networks such as Tor allow users to access Internet services privately by using
a series of routers to hide the client's IP address from the server. The success of such …

Time valid one-time signature for time-critical multicast data authentication

Q Wang, H Khurana, Y Huang… - IEEE INFOCOM …, 2009‏ - ieeexplore.ieee.org
It is challenging to provide authentication to time-critical multicast data, where low end-to-
end delay is of crucial importance. Consequently, it requires not only efficient authentication …

[HTML][HTML] Authentication and billing for dynamic wireless EV charging in an internet of electric vehicles

E ElGhanam, I Ahmed, M Hassan, A Osman - Future Internet, 2021‏ - mdpi.com
Dynamic wireless charging (DWC) is a promising technology to charge Electric Vehicles
(EV) using on-road charging segments (CS), also known as DWC pads. In order to ensure …

T/key: Second-factor authentication from secure hash chains

D Kogan, N Manohar, D Boneh - Proceedings of the 2017 ACM SIGSAC …, 2017‏ - dl.acm.org
Time-based one-time password (TOTP) systems in use today require storing secrets on both
the client and the server. As a result, an attack on the server can expose all second factors …