N
Nadarajah Asokan
Researcher at University of Waterloo
Publications - 329
Citations - 14076
Nadarajah Asokan is an academic researcher from University of Waterloo. The author has contributed to research in topics: Authentication & Mobile device. The author has an hindex of 58, co-authored 327 publications receiving 11947 citations. Previous affiliations of Nadarajah Asokan include Helsinki University of Technology & Syracuse University.
Papers
More filters
Things, Trouble, Trust: On Building Trust in IoT Systems
Tigist Abera,Nadarajah Asokan,Lucas Davi,Farinaz Koushanfar,Andrew Praverd,Gene Tsudik,Ahmad-Reza Sadeghi +6 more
TL;DR: The landscape of state-of-the-art attestation techniques from the IoT device perspective is surveyed and it is argued that most of them have a role to play in IoT trust establishment.
Patent
Method, system and devices for transferring accounting information
TL;DR: In this article, an Extensible Authentication Protocol response (EAP-response) packet is sent to an AAA server to digitally sign metering data related to a service used by at least one terminal.
Journal ArticleDOI
Toward Fairness of Cryptocurrency Payments
TL;DR: In this paper, the authors introduce the notion of strong timeliness for a fair exchange protocol and propose two fair payment-for-receipt protocol instantiations that leverage functionality of the blockchain to achieve strong timestamp.
Patent
Method, system and computer program product for a trusted counter in an external security element for securing a personal communication device
TL;DR: In this article, a system and computer program product for implementing a trusted counter in a personal communication device is presented, which utilizes cryptography and an external, read-write storage device that stores important state information that cannot be modified without detection.
Proceedings ArticleDOI
Old, new, borrowed, blue --: a perspective on the evolution of mobile platform security architectures
TL;DR: This paper describes the business, regulatory and end-user requirements which paved the way for this widespread deployment of mobile platform security architectures and describes typical hardware-based security mechanism that provide the foundation for mobile platformSecurity.