View article
RoMA Open
We present the Robotic Modeling Assistant (RoMA), an interactive fabrication system providing a fast, precise, hands-on and in-situ modeling experience. As a designer creates a new model using RoMA AR CAD editor, features are constructed c…
View article
Dragonblood: Analyzing the Dragonfly Handshake of WPA3 and EAP-pwd Open
The WPA3 certification aims to secure home networks, while EAP-pwd is used by certain enterprise Wi-Fi networks to authenticate users. Both use the Dragonfly handshake to provide forward secrecy and resistance to dictionary attacks. In thi…
View article
Port Contention for Fun and Profit Open
Simultaneous Multithreading (SMT) architectures are attractive targets for side-channel enabled attackers, with their inherently broader attack surface that exposes more per physical core microarchitecture components than cross-core attack…
View article
Post-Quantum TLS Without Handshake Signatures Open
\n Contains fulltext :\n 225738pre.pdf (Author’s version preprint ) (Open Access)\n \n Contains fulltext :\n 225738pub.pdf (Publisher’s version ) (Open Access)\n
View article
Lightweight Authenticated-Encryption Scheme for Internet of Things Based on Publish-Subscribe Communication Open
The resource-constrained nature and large-scale adoption of Internet of Things (IoT) have a significant challenge for securing IoT applications. This necessitates a robust and lightweight security architecture and schemes as the existing t…
View article
HTTPS traffic analysis and client identification using passive SSL/TLS fingerprinting Open
The encryption of network traffic complicates legitimate network monitoring, traffic analysis, and network forensics. In this paper, we present real-time lightweight identification of HTTPS clients based on network monitoring and SSL/TLS f…
View article
Private Set Intersection for Unequal Set Sizes with Mobile Applications Open
Private set intersection (PSI) is a cryptographic technique that is applicable to many privacy-sensitive scenarios. For decades, researchers have been focusing on improving its efficiency in both communication and computation. However, mos…
View article
Implementing and Proving the TLS 1.3 Record Layer Open
International audience
View article
Sustainability of Handshake Stewardship: Extending a Hand Is Effective Years Later Open
Background Children’s Hospital Colorado created a unique method of antimicrobial stewardship, called handshake stewardship, that effectively decreased hospital anti-infective use and costs in its pilot year (2013). Handshake stewardship is…
View article
Pluginizing QUIC Open
Application requirements evolve over time and the underlying protocols need to adapt. Most transport protocols evolve by negotiating protocol extensions during the handshake. Experience with TCP shows that this leads to delays of several y…
View article
A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Open
We analyze the handshake protocol of the Transport Layer Security (TLS) protocol, version 1.3. We address both the full TLS 1.3 handshake (the one round-trip time mode, with signatures for authentication and (elliptic curve) Diffie–Hellman…
View article
A social chemosignaling function for human handshaking Open
Social chemosignaling is a part of human behavior, but how chemosignals transfer from one individual to another is unknown. In turn, humans greet each other with handshakes, but the functional antecedents of this behavior remain unclear. T…
View article
Shaking Hands and Cooperation in Tele-present Human-Robot Negotiation Open
A 3 x 2 between subjects design examined the effect of shaking hands prior to engaging in a single issue distributive negotiation, where one negotiator performed their role tele-presently through a `Nao' humanoid robot. An additional third…
View article
An Energy Efficient Mutual Authentication and Key Agreement Scheme Preserving Anonymity for Wireless Sensor Networks Open
WSNs (Wireless sensor networks) are nowadays viewed as a vital portion of the IoTs (Internet of Things). Security is a significant issue in WSNs, especially in resource-constrained environments. AKA (Authentication and key agreement) enhan…
View article
An Energy-Efficient Reconfigurable DTLS Cryptographic Engine for Securing Internet-of-Things Applications Open
This paper presents the first hardware implementation of the Datagram\nTransport Layer Security (DTLS) protocol to enable end-to-end security for the\nInternet of Things (IoT). A key component of this design is a reconfigurable\nprime fiel…
View article
Insecure connection bootstrapping in cellular networks Open
In the cellular ecosystem, base stations act as trusted intermediaries between cellular devices and the core network. During connection bootstrapping, devices currently, however, do not possess any mechanisms to authenticate a base station…
View article
Finger Tracking Reveals the Covert Stages of Mental Arithmetic Open
We introduce a novel method capable of dissecting the succession of processing stages underlying mental arithmetic, thus revealing how two numbers are transformed into a third. We asked adults to point to the result of single-digit additio…
View article
5G New Radio Numerologies and their Impact on the End-To-End Latency Open
In this paper, we use a New Radio (NR) simulator, based on ns-3, to assess the impact of 5G NR numerologies on the end-to-end (E2E) latencies in a realistic and complex scenario, including TCP and UDP flows. As expected, we found that TCP …
View article
Magnetic handshake materials as a scale-invariant platform for programmed self-assembly Open
Significance Programmable self-assembly of smart, digital, and structurally complex materials from simple components remains a long-standing goal of material science. Here, we propose an assembly platform where information is encoded into …
View article
Energy-Efficient Collision Avoidance MAC Protocols for Underwater Sensor Networks: Survey and Challenges Open
The Medium Access Control (MAC) layer protocol is the most important part of any network, and is considered to be a fundamental protocol that aids in enhancing the performance of networks and communications. However, the MAC protocol’s des…
View article
Towards an Improved Energy Efficient and End-to-End Secure Protocol for IoT Healthcare Applications Open
In this paper, we proposed LCX-MAC (local coordination X-MAC) as an extension of X-MAC. X-MAC is an asynchronous duty cycle medium access control (MAC) protocol. X-MAC used one important technique of short preamble which is to allow sender…
View article
Quantum-resistant Transport Layer Security Open
The reliance on asymmetric public key cryptography (PKC) and symmetric encryption for cyber-security in current telecommunication networks is threatened by the emergence of powerful quantum computing technology. This is due to the ability …
View article
Vitality Forms Expressed by Others Modulate Our Own Motor Response: A Kinematic Study Open
During social interaction, actions, and words may be expressed in different ways, for example, gently or rudely. A handshake can be gentle or vigorous and, similarly, tone of voice can be pleasant or rude. These aspects of social communica…
View article
End-to-End Optimization of Deep Learning Applications Open
The irregularity of recent Convolutional Neural Network (CNN) models such as less data reuse and parallelism due to the extensive network pruning and simplification creates new challenges for FPGA acceleration. Furthermore, without proper …
View article
A Low Latency, Energy Efficient MAC Protocol for Wireless Sensor Networks Open
Reducing unnecessary and redundant handshake frame is considered as a promising way to reduce the end-to-end delay and energy consumption. Here, a protocol named compressed handshake media access control (CH-MAC) is presented. CH-MAC intro…
View article
Human-Robot Handshaking: A Review Open
For some years now, the use of social, anthropomorphic robots in various situations has been on the rise. These are robots developed to interact with humans and are equipped with corresponding extremities. They already support human users …
View article
Is the Web Ready for OCSP Must-Staple? Open
TLS, the de facto standard protocol for securing communications over the Internet, relies on a hierarchy of certificates that bind names to public keys. Naturally, ensuring that the communicating parties are using only valid certificates i…
View article
Bounded Disturbance Amplification for Mass Chains with Passive Interconnection Open
This paper introduces the problem of passive control of a chain of N\nidentical masses in which there is an identical passive connection between\nneighbouring masses and a similar connection to a movable point. The problem\narises in the d…
View article
Cooperative Scheduling of AGV and ASC in Automation Container Terminal Relay Operation Mode Open
The key problem of operation optimization for automated container terminal is the coordinated scheduling of automated quay crane (QC), automated guided vehicle (AGV), and automated stacking crane (ASC). In order to solve this problem, this…
View article
Fine-Grained Support of Security Services for Resource Constrained Internet of Things Open
Internet of Things (IoT) technologies allow everyday objects to be capable of connecting to the Internet, thereby making smart and convenient daily life. Although users' daily lives can be convenient due to various smart services utilizing…