Search
for Author
All Reviews
Susilo, Willy
Options:
All Media Types
Journals
Proceedings
Div Books
Whole Books
Other
Date Reviewed
Title
Author
Publisher
Published Date
Descending
Ascending
Date Reviewed
1
-
3
of
3
reviews
Man-in-the-middle attacks on secure simple pairing in Bluetooth standard V5.0 and its countermeasure
Sun D., Mu Y., Susilo W. Personal and Ubiquitous Computing 22(1): 55-67, 2018. Type: Article
Sun et al. describe a vulnerability in the Bluetooth protocol. In particular, they show that a part of the so-called secure simple pairing (SSP) process can be attacked in a man-in-the-middle scenario. SSP is used by newer Bluetooth de...
...
May 3 2018
A generalized attack on RSA type cryptosystems
Bunder M., Nitaj A., Susilo W., Tonien J. Theoretical Computer Science 704 74-81, 2017. Type: Article
The safety of the well-known RSA cryptosystem is based on the fact that, in general, it is computationally very hard to factorize large integers. Given two large prime numbers
p
and
q
, the public k...
...
Mar 23 2018
Fully privacy-preserving and revocable ID-based broadcast encryption for data access control in smart city
Lai J., Mu Y., Guo F., Susilo W., Chen R. Personal and Ubiquitous Computing 21(5): 855-868, 2017. Type: Article
The “smart city” will provide numerous services via broadcasted encrypted data, such as a pin or key for paid users to access water service. These researchers go beyond data security and consider data access control...
...
Jan 10 2018
Reproduction in whole or in part without permission is prohibited. Copyright 1999-2024 ThinkLoud
®
Terms of Use
|
Privacy Policy