In this paper, we present and analyze an event distribution system for brain-computer interfaces. Events are commonly used to mark and describe incidents during an experiment and are therefore critical for later data analysis or immediate real-time process ...
Institute of Electrical and Electronics Engineers2017
We present protocols for creating pairwise secrets between nodes in a wireless network, so that these secrets are secure from an eavesdropper, Eve, with unbounded computational and memory capabilities, but with limited network presence. We first present a ...
TLS 1.3 takes important steps to improve both performance and security, so far offers little protection against traffic analysis or fingerprinting using unencrypted metadata or other side-channels such as transmission lengths and timings. This paper explor ...
As our sensitive data is increasingly carried over the Internet and stored remotely, security in communications becomes a fundamental requirement. Yet, today's security practices are designed around assumptions the validity of which is being challenged. In ...
A copper-catalyzed oxyalkylation of allylic alcohols using nonactivated alkyl nitriles as reaction partners was developed. A sequence involving generation of an alkyl nitrile radical followed by its addition to a double bond and a copper-mediated formation ...
A copper-catalyzed alkylation of allylic alcohols by alkyl nitriles with concomitant 1,2-aryl migration was developed. Formation of the alkyl nitrile radical was followed by its intermolecular addition to alkenes and the migration of a vicinal aryl group w ...
All wireless devices must comply with the local radio regulations which are set by international and national regulatory bodies such as the European Telecommunication Standardization Institute (ETSI) for Europe and the Federal Commission for Communication ...
We propose an efficient remote biometric authentication protocol that gives strong protection to the user’s biometric data in case of two common kinds of security breaches: (1) loss or theft of the user’s token (smart card, handheld device, etc.), giving t ...