scispace - formally typeset
N

Nadarajah Asokan

Researcher at University of Waterloo

Publications -  329
Citations -  14076

Nadarajah Asokan is an academic researcher from University of Waterloo. The author has contributed to research in topics: Authentication & Mobile device. The author has an hindex of 58, co-authored 327 publications receiving 11947 citations. Previous affiliations of Nadarajah Asokan include Helsinki University of Technology & Syracuse University.

Papers
More filters
Patent

System and method for establishing bearer-independent and secure connections

TL;DR: In this paper, a system and method for efficiently enabling local security connectivity between electronic devices over multiple bearers is presented, where electronic devices are configured to advertise, over each bearer, their respective configuration parameters for each bearer.
Book ChapterDOI

Ad hoc security associations for groups

TL;DR: New protocols based on both passkeys and numeric comparison (short authenticated strings) are presented and security properties and group management for these protocols are discussed.
Proceedings ArticleDOI

Do I know you?: efficient and privacy-preserving common friend-finder protocols and applications

TL;DR: The Common Friends service is introduced, a framework for finding common friends which protects privacy of non-mutual friends and guarantees authenticity of friendships, and an efficient instantiation is proposed, based on Bloom filters, that only incurs a constant number of public-key operations and appreciably low communication overhead.
Proceedings Article

PAC it up: Towards Pointer Integrity using ARM Pointer Authentication

TL;DR: In this article, the authors use pointer authentication (PA) to build novel defenses against various classes of run-time attacks, including the first PA-based mechanism for data pointer integrity.
Proceedings ArticleDOI

The Circle Game: Scalable Private Membership Test Using Trusted Hardware

TL;DR: This work proposes a simple PMT approach using a carousel: circling the entire dictionary through trusted hardware on the cloud server, and shows how the carousel approach, using different data structures to represent the dictionary, can be realized on two different commercial hardware security architectures.