Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
  Susilo, Willy Add to Alert Profile  
 
Options:
Date Reviewed  
  1 - 3 of 3 reviews    
  Man-in-the-middle attacks on secure simple pairing in Bluetooth standard V5.0 and its countermeasure
Sun D., Mu Y., Susilo W. Personal and Ubiquitous Computing 22(1): 55-67, 2018.  Type: Article

Sun et al. describe a vulnerability in the Bluetooth protocol. In particular, they show that a part of the so-called secure simple pairing (SSP) process can be attacked in a man-in-the-middle scenario. SSP is used by newer Bluetooth de...
...
May 3 2018  
  A generalized attack on RSA type cryptosystems
Bunder M., Nitaj A., Susilo W., Tonien J. Theoretical Computer Science 704 74-81, 2017.  Type: Article

The safety of the well-known RSA cryptosystem is based on the fact that, in general, it is computationally very hard to factorize large integers. Given two large prime numbers p and q, the public k...
...
Mar 23 2018  
   Fully privacy-preserving and revocable ID-based broadcast encryption for data access control in smart city
Lai J., Mu Y., Guo F., Susilo W., Chen R. Personal and Ubiquitous Computing 21(5): 855-868, 2017.  Type: Article

The “smart city” will provide numerous services via broadcasted encrypted data, such as a pin or key for paid users to access water service. These researchers go beyond data security and consider data access control...
...
Jan 10 2018  

   
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy