N
Nadarajah Asokan
Researcher at University of Waterloo
Publications - 329
Citations - 14076
Nadarajah Asokan is an academic researcher from University of Waterloo. The author has contributed to research in topics: Authentication & Mobile device. The author has an hindex of 58, co-authored 327 publications receiving 11947 citations. Previous affiliations of Nadarajah Asokan include Helsinki University of Technology & Syracuse University.
Papers
More filters
Patent
System and method for establishing bearer-independent and secure connections
Janne Marin,Kari Kostiainen,Nadarajah Asokan,Seamus Moloney,Philip Ginzboorg,Javier Lafuente +5 more
TL;DR: In this paper, a system and method for efficiently enabling local security connectivity between electronic devices over multiple bearers is presented, where electronic devices are configured to advertise, over each bearer, their respective configuration parameters for each bearer.
Book ChapterDOI
Ad hoc security associations for groups
TL;DR: New protocols based on both passkeys and numeric comparison (short authenticated strings) are presented and security properties and group management for these protocols are discussed.
Proceedings ArticleDOI
Do I know you?: efficient and privacy-preserving common friend-finder protocols and applications
TL;DR: The Common Friends service is introduced, a framework for finding common friends which protects privacy of non-mutual friends and guarantees authenticity of friendships, and an efficient instantiation is proposed, based on Bloom filters, that only incurs a constant number of public-key operations and appreciably low communication overhead.
Proceedings Article
PAC it up: Towards Pointer Integrity using ARM Pointer Authentication
TL;DR: In this article, the authors use pointer authentication (PA) to build novel defenses against various classes of run-time attacks, including the first PA-based mechanism for data pointer integrity.
Proceedings ArticleDOI
The Circle Game: Scalable Private Membership Test Using Trusted Hardware
TL;DR: This work proposes a simple PMT approach using a carousel: circling the entire dictionary through trusted hardware on the cloud server, and shows how the carousel approach, using different data structures to represent the dictionary, can be realized on two different commercial hardware security architectures.