Share This Author
Practical Attacks Against Privacy and Availability in 4G/LTE Mobile Communication Systems
- Altaf Shaik, J. Seifert, R. Borgaonkar, N. Asokan, Valtteri Niemi
- Computer ScienceNDSS
- 26 October 2015
This work constitutes the first publicly reported practical attacks against LTE access network protocols and recommends that safety margins introduced into future specifications to address such trade-offs should incorporate greater agility to accommodate subsequent changes in the trade-off equilibrium.
UMTS Networks: Architecture, Mobility and Services
UMTS Network provides a comprehensive introduction and reference to third-generation mobile systems, suitable for individuals at a variety of knowledge levels.
Secure Vickrey Auctions without Threshold Trust
Two new cryptographic Vickrey auction schemes are proposed that involve, apart from the bidders and the seller S, an auction authority A so that unless S and A collude the outcome of auctions will be correct, and moreover, S will not get any information about the bids, while A will learn bid statistics.
And how this book will influence you to do better future? It will relate to how the readers will get the lessons that are coming. As known, commonly many people will believe that reading can be an…
Secure Multiparty Computations Without Computers
Man-in-the-Middle in Tunnelled Authentication Protocols
This paper proposes a solution to the problem of a man-in-the-middle attack on protocol composition by using a cryptographic binding between the client authentication protocol and the tunnel protocol.
UAKA-D2D: Universal Authentication and Key Agreement Protocol in D2D Communications
A Universal Authentication and Key Agreement protocol for D2D communications (UAKA-D2D) to achieve secure communication session establishment, where user roaming and inter-operator operation are considered and results show the efficiency and practicality of the proposed protocol.
A concise, updated guide to the 3GPP LTE Security Standardization specifications A welcome Revised Edition of the successful LTE Security addressing the security architecture for SAE/LTE, which needed a major redesign due to the significantly increased complexity, and different architectural and business requirements of fourth generation systems.
Distributed Usage Control
It is shown how a standard deck of playing cards can be used to implement a secure multiparty protocol to compute any boolean function, and the number of necessary cards is reduced.