In this paper, we propose a new symmetric stream cipher encryption algorithm based on Graph Walks and 2-dimensional matrices, called Matrix Encryption Walks (MEW). We offer example Key Matrices and show the efficiency of the proposed... more
The Internet of Things (IoT) is a new concept that is developed considerably in current wireless communications. The main idea of this paradigm is the exchange of information and data from real-world devices with the internet by using... more
Entity authentication is crucial for ensuring secure quantum communication because the identity of the participants in a network must be confirmed before transmitting any confidential information. We propose a practical entity... more
Web3 is the next evolution of the internet, which uses blockchains, cryptocurrencies, and NFTs to return ownership and authority to the consumers. The potential of Web3 is highlighted by the creation of decentralized applications (dApps),... more
A communication protocol is an agreement among two or more parties on the sequence of operations and the format of messages to be exchanged. Standardization organizations define protocols in the form of recommendations (e.g., RFC) written... more
The Internet of Things (IoT) is increasingly affecting human lives in multiple profound ways. "Things" have the ability to communicate, generate, transmit and store data over the network connection. During each communication between... more
This document defines the Tunnel Extensible Authentication Protocol (TEAP) version 1. TEAP is a tunnel-based EAP method that enables secure communication between a peer and a server by using the Transport Layer Security (TLS) protocol to... more
It is possible to show that well-known attacks on authentication protocols are flawed. This is a problem, since good protocols may thus be dismissed rather than improved and poor protocols that might continue to be used although they may... more
A new tool for automated validation of attacks on authentication protocols has been used to find several errors and ambiguities in the list of attacks described in the well known report by Clark and Jacob. In this paper the errors are... more
Secure communication mechanisms in Wireless Sensor Networks (WSNs) have been widely deployed to ensure confidentiality, authenticity and integrity of the nodes and data. Recently many WSNs applications rely on trusted communication to... more
With the increasing performance and dropping price of wireless networking equipment, wireless networking has revolutionized the way people work and play. Wi-Fi hot spots popping up all over the country provide a convenient means of... more
With fast evolution of mobile devices and mobile network, the need of protecting user sensitive information locally and performing secure user authentication remotely become evermore increasing. Bio‐cryptography is emerging as a powerful... more
The continued development of technology and the many systems that make the quality of academic work and learning systems become more easily and efficiently . Universitas Bina Darma already have a quality system , in previous research... more
Wireless sensor networks provide solutions to a range of monitoring problems. However, they introduce a new set of problems mainly due to small memories, weak processors, limited energy and small packet size. Thus only a very few... more
We consider the problem of authenticated group key exchange among n parties communicating over an insecure public network. A number of solutions to this problem have been proposed; however, all prior provably secure solutions do not scale... more
We consider the fundamental problem of authenticated group key exchange among n parties within a larger and insecure public network. A number of solutions to this problem have been proposed; however, all provably-secure solutions thus far... more
Radio frequency identification (RFID) is a powerful technology that enables wireless information storage and control in an economical way. These properties have generated a wide range of applications in different areas. Due to economic... more
Secure key management is crucial to meet the security goals to prevent the Wireless Sensor Networks (WSNs) being compromised by an adversary. Owing to ad-hoc nature and resource limitations of sensor networks, provisioning a right key... more
The study of multiagent systems (MASs) focuses on systems in which many intelligent agents interact with each other using communication protocols. For example, an authentication protocol is used to verify and authorize agents acting on... more
This document is one of a series concerned with defining a roadmap of protocol specification work for the use of modern cryptographic mechanisms and algorithms for message authentication in routing protocols. In particular, it defines the... more
To improve the quality of service and reduce the possibility of security attacks, a secure and efficient user authentication mechanism is required for Wireless Sensor Networks (WSNs) and the Internet of Things (IoT). Session key... more
The Point-to-Point Protocol (PPP) provides a standard method for transporting multi-protocol datagrams over point-to-point links. PPP also defines an extensible Link Control Protocol, which allows negotiation of an Authentication Protocol... more
In recent years, physical unclonable functions (PUFs) have gained a lot of attention as mechanisms for hardware-rooted device authentication. While the majority of the previously proposed PUFs derive entropy using dedicated circuitry,... more
Silicon physical unclonable function (PUF) has emerged as a promising spoof-proof solution for low-cost device authentication. Due to practical constraints in preventing phishing through public network or insecure communication channels,... more
RFID technology has received much attention both in industry and academia in recent years and it is seen as the leading ubiquitous computing technology. A typical RFID system consists of a reader, , and a set of tags, . The reader is... more
As a lightweight hardware security primitive, PUFs can provide reliable identity authentication for devices of Internet of things (IoTs) with limited resources. However, the delay-based PUF structures in authentication protocols have... more
As a lightweight hardware security primitive, PUFs can provide reliable identity authentication for devices of Internet of things (IoTs) with limited resources. However, the delay-based PUF structures in authentication protocols have... more
A physical unclonable function (PUF) is a hardware security primitive, which can be used secure various hardware-based applications. As a type of PUFs, strong PUFs have a large number of challenge-response pairs (CRPs), which can be used... more
Silicon physical unclonable function (PUF) has emerged as a promising spoof-proof solution for low-cost device authentication. Due to practical constraints in preventing phishing through public network or insecure communication channels,... more
Due to practical constraints in preventing phishing through public network or insecure communication channels, simple physical unclonable function (PUF)-based authentication protocol with unrestricted queries and transparent responses is... more
The provision of security in mobile ad hoc networks is of paramount importance due to their wireless nature. However, when conducting research into security protocols for ad hoc networks it is necessary to consider these in the context of... more
RFID technology has received much attention both in industry and academia in recent years and it is seen as the leading ubiquitous computing technology. A typical RFID system consists of a reader, , and a set of tags, . The reader is... more
Over the last two decades, several researchers have recommended many remote user authentication schemes, following since introducing the concept way back in 1981. Researchers are continuously trying to enhance the security in... more
Vehicular Ad-Hoc Network, better known as VANET is a promising new technology which combines the capabilities of different wireless networks in vehicles enabling Intelligent Transportation System (ITS). Vehicular Ad-Hoc networks provide... more
For any given two graphs G and H , the notation F → (G, H ) means that for any red-blue coloring of all the edges of F will create either a red subgraph isomorphic to G or a blue subgraph isomorphic to for every e ∈ E(F). The class of all... more
A mobile ad hoc network (MANET) is a collection of mobile nodes that communicate with each other by forming a multi-hop radio network. Security remains a major challenge for these networks due to their features of open medium, dynamically... more
Wireless mesh networks (WMNs) have emerged as a key technology for next generation wireless broadband networks showing rapid progress and inspiring numerous compelling applications. A WMN comprises of a set of mesh routers (MRs) and mesh... more
As more resources are added to computer networks, and as more vendors look to the World Wide Web as a viable marketplace, the importance of being able to restrict access and to insure some kind of acceptable behavior even in the presence... more
In this paper, we present a comprehensive taxonomy of the most popular authentication mechanisms, the main threats, vulnerabilities, the possible types of attacks and the security issues that are associated with computer systems. Our main... more
We give new algorithms for a variety of randomly-generated instances of computational problems using a linearization technique that reduces to solving a system of linear equations. These algorithms are derived in the context of learning... more
In order to prevent the SPA (Simple Power Analysis) attack against modular exponentiation algorithms, a multiply-always implementation is generally used. Witteman et al. introduced in [14] a new cross-correlation power analysis attack... more
Wireless Sensor Networks (WSNs) are widely used in diverse applications due to their cost-effectiveness and versatility. However, they face substantial difficulties because of their innate resource constraints and susceptibility to... more
It is well known that certain quantum correlations like quantum steering exhibit a monogamous relationship. In this paper, we exploit the asymmetric nature of quantum steering and show that there exist states which exhibit a kind of... more
It is well known that certain quantum correlations like quantum steering exhibit a monogamous relationship. In this paper, we exploit the asymmetric nature of quantum steering and show that there exist states which exhibit a polygamous... more
Adaptive authentication is a risk-based authentication that identifies high-risk and suspicious illegitimate login attempts. User past login records which implicitly contains attribute factors context information are used to establish... more
The emergence of the pervasive device has made log-in details more vulnerable to unauthorized access and damage. This is due to frequent changes in users of pervasive devices and the close affinity of many attackers. Most models available... more
In this paper a 'fair' key generation and certification protocol for Diffie-Hellman keys is proposed, which is intended for use in cases where neither User nor CA are trusted to choose the User's key on their own. This... more
This paper seeks to give solutions to possible demands for lawful interception of communications. Certain modi cations to the ASPeCT Authentication and Initialisation of Payment protocol are proposed that give it a key recovery... more
We propose a method for integrating NTRUEncrypt into the ntor key exchange protocol as a means of achieving a quantum-safe variant of forward secrecy. The proposal is a minimal change to ntor, essentially consisting of an... more
The IEEE 802.22 standard regulates wireless regional area network (WRAN) operating at the very high frequency and ultrahigh frequency television white space (TVWS) bands. WRAN supports extensible authentication protocol (EAP)-based... more