Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJuly 2024
Enhancing Cybersecurity Curriculum Development: AI-Driven Mapping and Optimization Techniques
ARES '24: Proceedings of the 19th International Conference on Availability, Reliability and SecurityArticle No.: 107, Pages 1–10https://doi.org/10.1145/3664476.3670467Cybersecurity has become important, especially during the last decade. The significant growth of information technologies, internet of things, and digitalization in general, increased the interest in cybersecurity professionals significantly. While the ...
- research-articleJuly 2024
Quantum-Resistant and Secure MQTT Communication
ARES '24: Proceedings of the 19th International Conference on Availability, Reliability and SecurityArticle No.: 156, Pages 1–8https://doi.org/10.1145/3664476.3670463In this paper, we deal with the deployment of Post-Quantum Cryptography (PQC) in Internet of Things (IoT). Concretely, we focus on the MQTT (Message Queuing Telemetry Transport) protocol that is widely used in IoT services. The paper presents our novel ...
- research-articleJuly 2024
Lattice-based Multisignature Optimization for RAM Constrained Devices
ARES '24: Proceedings of the 19th International Conference on Availability, Reliability and SecurityArticle No.: 155, Pages 1–10https://doi.org/10.1145/3664476.3670461In the era of growing threats posed by the development of quantum computers, ensuring the security of electronic services has become fundamental. The ongoing standardization process led by the National Institute of Standards and Technology (NIST) ...
- research-articleJuly 2024
Secure and Privacy-Preserving Car-Sharing Systems
ARES '24: Proceedings of the 19th International Conference on Availability, Reliability and SecurityArticle No.: 160, Pages 1–10https://doi.org/10.1145/3664476.3670443With increasing smart transportation systems and services, potential security and privacy threats are growing. In this work, we analyze privacy and security threats in car-sharing systems, and discuss the problems with the transparency of services, ...
- research-articleAugust 2023
Enhancing Cybersecurity Education in Europe: The REWIRE’s Course Selection Methodology
ARES '23: Proceedings of the 18th International Conference on Availability, Reliability and SecurityArticle No.: 66, Pages 1–7https://doi.org/10.1145/3600160.3605091The European Cybersecurity Skills Framework (ECSF) was introduced by the European Union Agency for Cybersecurity (ENISA) to identify the necessary competencies, knowledge, and skills required for European cybersecurity professionals. The ECSF condenses ...
-
- research-articleAugust 2023
On Efficiency and Usability of Group Signatures on Smartphone and Single-board Platforms
ARES '23: Proceedings of the 18th International Conference on Availability, Reliability and SecurityArticle No.: 127, Pages 1–9https://doi.org/10.1145/3600160.3605015With increasing digitalization and omnipresent data sensing, security and users’ privacy become essential requirements in new digital services. Group Signatures (GS) or also known as Anonymous Digital Signatures (ADS) are often used as a core Privacy-...
- research-articleAugust 2022
Real-world Deployment of Privacy-Enhancing Authentication System using Attribute-based Credentials
ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and SecurityArticle No.: 141, Pages 1–9https://doi.org/10.1145/3538969.3543803With the daily increase in digitalization and integration of the physical and digital worlds, we need to better protect users’ privacy and identity. Attribute-based Credentials (ABCs) seem to be a promising technology for this task. In this paper, we ...
- research-articleAugust 2022
Implementation of Revocable Keyed-Verification Anonymous Credentials on Java Card
ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and SecurityArticle No.: 140, Pages 1–8https://doi.org/10.1145/3538969.3543798Java Card stands out as a good choice for the development of smart card applications due to the high interoperability between different manufacturers, its security, and wide support of cryptographic algorithms. Despite extensive cryptographic support, ...
- research-articleAugust 2021
Privacy-Preserving Online Parking Based on Smart Contracts
ARES '21: Proceedings of the 16th International Conference on Availability, Reliability and SecurityArticle No.: 153, Pages 1–10https://doi.org/10.1145/3465481.3470058This work presents a complex privacy-preserving solution based on attribute-based credentials and smart contract techniques for emerging parking services in city zones. Our system provides the full set of privacy-enhancing features such as anonymity, ...
- research-articleAugust 2021
Secret Sharing-based Authenticated Key Agreement Protocol
ARES '21: Proceedings of the 16th International Conference on Availability, Reliability and SecurityArticle No.: 152, Pages 1–10https://doi.org/10.1145/3465481.3470057In this article, we present two novel authenticated key agreement (AKA) schemes that are easily implementable and efficient even on constrained devices. Both schemes are constructed over elliptic curves and extend Schonorr’s signature of knowledge ...
- research-articleAugust 2021
Implementing CRYSTALS-Dilithium Signature Scheme on FPGAs
- Sara Ricci,
- Lukas Malina,
- Petr Jedlicka,
- David Smékal,
- Jan Hajny,
- Peter Cibik,
- Petr Dzurenda,
- Patrik Dobias
ARES '21: Proceedings of the 16th International Conference on Availability, Reliability and SecurityArticle No.: 1, Pages 1–11https://doi.org/10.1145/3465481.3465756In July 2020, the lattice-based CRYSTALS-Dilithium digital signature scheme has been chosen as one of the three third-round finalists in the post-quantum cryptography standardization process by the National Institute of Standards and Technology (NIST). ...
- ArticleDecember 2019
A Privacy-Enhancing Framework for Internet of Things Services
AbstractThe world has seen an influx of connected devices through both smart devices and smart cities, paving the path forward for the Internet of Things (IoT). These emerging intelligent infrastructures and applications based on IoT can be beneficial to ...
- research-articleAugust 2019
A Secure Publish/Subscribe Protocol for Internet of Things
ARES '19: Proceedings of the 14th International Conference on Availability, Reliability and SecurityArticle No.: 75, Pages 1–10https://doi.org/10.1145/3339252.3340503The basic concept behind the emergence of Internet of Things (IoT) is to connect as many objects to the Internet as possible in an attempt to make our lives better in some way. However, connecting everyday objects like your car or house to the Internet ...
- research-articleAugust 2018
Secure and efficient two-factor zero-knowledge authentication solution for access control systems
Computers and Security (CSEC), Volume 77, Issue CPages 500–513https://doi.org/10.1016/j.cose.2018.05.006AbstractThe authentication schemes based on common chip cards such as Mifare cards are still very popular and are used in various access control systems deployed in critical infrastructure sectors, universities, companies, libraries, hospitals,...
- research-articleJanuary 2018
Multidevice Authentication with Strong Privacy Protection
Card-based physical access control systems are used by most people on a daily basis, for example, at work, in public transportation, or at hotels. Yet these systems have often very poor cryptographic protection. User identifiers and keys can be easily ...
- ArticleJuly 2016
Multi-Device Authentication using Wearables and IoT
ICETE 2016: Proceedings of the 13th International Joint Conference on e-Business and TelecommunicationsPages 483–488https://doi.org/10.5220/0006000004830488The paper presents a novel cryptographic authentication scheme that makes use of the presence of electronic devices around users. The scheme makes authentication more secure by involving devices that are usually worn by users (such as smart-watches, ...
- articleDecember 2015
Attribute-based credentials with cryptographic collusion prevention
Security and Communication Networks (SACN), Volume 8, Issue 18Pages 3836–3846https://doi.org/10.1002/sec.1304Cryptographic attribute-based credentials ABCs allow users to prove their personal attributes remotely and in a privacy-friendly way. While staying anonymous and untraceable, the users are able to prove their attributes, such as age, membership, or ...
- ArticleNovember 2015
Privacy-Enhanced Data Collection Scheme for Smart-Metering
Inscrypt 2015: Revised Selected Papers of the 11th International Conference on Information Security and Cryptology - Volume 9589Pages 413–429https://doi.org/10.1007/978-3-319-38898-4_24New types of devices, such as smart-meters, wearables and home appliances, have been connected to the Internet recently. Data they send is usually very privacy sensitive, containing personal information about, e.g., household consumption, health status ...
- ArticleJuly 2015
Secure Physical Access Control with Strong Cryptographic Protection
ICETE 2015: Proceedings of the 12th International Joint Conference on e-Business and Telecommunications - Volume 4Pages 220–227https://doi.org/10.5220/0005524202200227This paper is focused on the area of physical access control systems (PACs), particularly on the systems for
building access control. We show how the application of modern cryptographic protocols, namely the cryptographic
proofs of knowledge, can ...
- research-articleNovember 2014
Privacy-PAC: Privacy-Enhanced Physical Access Control
WPES '14: Proceedings of the 13th Workshop on Privacy in the Electronic SocietyPages 93–96https://doi.org/10.1145/2665943.2665969The cryptographic privacy-enhancing technologies were originally designed to improve the privacy and digital identity protection in electronic applications, such as cloud services, private Internet databases or communication systems. However, the access ...