Security Protocol Design

Currently, there are a number of secure channel protocols that do not take into account the specific characteristics (e.g. processing overheads, communication buffers, etc.) of the underlying technology utilised by different devices. We have proposed, in the following papers [95, 100] a number of secure channel protocols that were designed specifically by taking into account all these factors.

Akram, R.N., Markantonakis, K., Mayes, K.: A Privacy Preserving Application Acquisition Protocol. In: Geyong Min, F.G.M. 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom’12). p. 383-392. IEEE Computer Society, Liverpool, United Kingdom (2012).Abstract