Establishing and maintaining secure communications in the Internet of Th...
More and more consumer devices implement the IEEE Ultra-Wide Band (UWB)
...
Modern smartphones support FIDO2 passwordless authentication using eithe...
Wireless backhauling at millimeter-wave frequencies (mmWave) in static
s...
Big data applications offer smart solutions to many urgent societal
chal...
When an iPhone is turned off, most wireless chips stay on. For instance,...
Finder networks in general, and Apple's Find My network in particular, c...
Corporate Virtual Private Networks (VPNs) enable users to work from home...
This paper investigates rate-splitting (RS) precoding for non-orthogonal...
Modern mobile devices feature multiple wireless technologies, such as
Bl...
Wearables that constantly collect various sensor data of their users inc...
We present the first over-the-air attack on IEEE 802.15.4z High-Rate Pul...
Context-based copresence detection schemes are a necessary prerequisite ...
Bluetooth pairing establishes trust on first use between two devices by
...
The omnipresence of IoT devices in Industry 4.0 is expected to foster hi...
Researchers help operators of vulnerable and non-compliant internet serv...
In the era of large-scale internet scanning, misconfigured websites are ...
With the advent of the Internet of Things (IoT), establishing a secure
c...
Overnight, Apple has turned its hundreds-of-million-device ecosystem int...
The intrinsic hardware imperfection of WiFi chipsets manifests itself in...
Misconfigurations and outdated software are a major cause of compromised...
Network programmability will be required to handle future increased netw...
Cyclically shifted partial transmit sequences (CS-PTS) has conventionall...
Near-Field Communication (NFC) is being used in a variety of
security-cr...
Millimeter-wave (mmWave) communication is a promising technology to cope...
The market for Bluetooth Low Energy devices is booming and, at the same ...
Bluetooth chips must include a Random Number Generator (RNG). This RNG i...
Wireless communication standards and implementations have a troubled his...
In this demo, we provide an overview of the macOS Bluetooth stack intern...
Multiple initiatives propose utilizing Bluetooth Low Energy (BLE)
advert...
Due to the increase in natural disasters in the past years, Disaster Res...
Industry 4.0 anticipates massive interconnectivity of industrial devices...
Reproducibility and realistic datasets are crucial for advancing researc...
Mobile devices have shown to be very useful during and post disaster. If...
Multicast beamforming is known to improve spectral efficiency. However, ...
Millimeter-wave (mmWave) communication plays a vital role to efficiently...
Bluetooth is among the dominant standards for wireless short-range
commu...
Bluetooth is one of the most established technologies for short range di...
The Internet of Things (IoT) demands authentication systems which can pr...
Apple Wireless Direct Link (AWDL) is a proprietary and undocumented wire...
Today, online privacy is the domain of regulatory measures and
privacy-e...
Smartphone-based communication networks form a basis for services in
eme...
Communications play a vital role in the response to disasters and crises...
Practical solutions to bootstrap security in today's information and
com...
The Authentication and Authorization for Constrained Environments (ACE)
...
Apple Wireless Direct Link (AWDL) is a proprietary and undocumented IEEE...
In the communication systems domain, constructing and maintaining networ...
Communication networks form the backbone of our society. Topology contro...
Millimeter-wave (mmWave) communication is a promising technology to cope...
Full control over a Wi-Fi chip for research purposes is often limited by...