搜索结果: 1-15 共查到“user”相关记录288条 . 查询时间(0.136 秒)
Lattice-Based Remote User Authentication from Reusable Fuzzy Signature
Lattice-Based Cryptography Fuzzy Signatures Biometrics Reusability
2019/6/26
In this paper, we introduce a new construction of lattice-based reusable fuzzy signature for remote user authentication that is secure against quantum computers. We define formal security models for t...
Revisiting Key-alternating Feistel Ciphers for Shorter Keys and Multi-user Security
blockcipher provable security multi-user security
2018/11/19
Our results hold in the multi-user setting as well, constituting the first non-trivial multi-user provable security results on Feistel ciphers. We finally demonstrate applications of our results on de...
User Study on Single Password Authentication
Password authentication usability two-factor authentication
2018/11/6
Single password authentication (SPA) schemes are introduced to overcome the challenges of traditional password authentications, which are vulnerable to offline dictionary, phishing, honeypot, and man-...
The Multi-user Security of GCM, Revisited: Tight Bounds for Nonce Randomization
cryptographic protocols Nonce Randomization
2018/11/5
Multi-user (mu) security considers large-scale attackers (e.g., state actors) that given access to a number of sessions, attempt to compromise {\em at least} one of them. Mu security of authenticated ...
Geosocial Query with User-Controlled Privacy
location privacy homomorphic encryption applications
2018/4/4
Geosocial applications collect (and record) users’ precise location data to perform proximity computations, such as notifying a user or triggering a service when a friend is within geographic proximit...
TOWARDS GESTURE-BASED MULTI-USER INTERACTIONS IN COLLABORATIVE VIRTUAL ENVIRONMENTS
Collaborative Virtual Reality Hand and Finger tracking Leap Motion Unity3D Forensics
2018/3/6
We present a virtual reality (VR) setup that enables multiple users to participate in collaborative virtual environments and interact via gestures. A collaborative VR session is established through a ...
Revisiting AES-GCM-SIV: Multi-user Security, Faster Key Derivation, and Better Bounds
Multi-user security AES-GCM-SIV authenticated encryption
2018/2/8
This paper revisits the multi-user (mu) security of symmetric encryption, from the perspective of delivering an analysis of the AES-GCM-SIV AEAD scheme. Our end result shows that its mu security is co...
Secure and Scalable Multi-User Searchable Encryption
distributed cryptography oblivious transfer searchable encryption
2018/1/29
By allowing a large number of users to behave as readers or writers, Multi-User Searchable Encryption (MUSE) raises new security and performance challenges beyond the typical requirements of Symmetric...
IntegriKey: End-to-End Integrity Protection of User Input
End-to-End Integrity Protection User Input
2018/1/2
Networked critical systems, such as Programmable Logic Controllers in a factory plant, are often remotely configurable by administrators through web-based interfaces. However, administrative host mach...
There Goes Your PIN: Exploiting Smartphone Sensor Fusion Under Single and Cross User Setting
Smartphones PIN Sensor
2017/12/6
A range of zero-permission sensors are found in modern smartphones to enhance user experience. These sensors can lead to unintentional leakage of user private data. In this paper, we combine leakage f...
Cell Modeling Tool Makes Complex Calculations User-Friendly(图)
Cell Modeling Tool Complex Calculations User-Friendly
2017/10/25
Programming a molecular biology experiment can be similar to playing Sudoku; both are simple if you’re working with only a few molecules or a small grid, but they explode in complexity as they grow. N...
Hybrid Encryption in a Multi-User Setting, Revisited
hybrid encryption multi-user security tightness
2017/9/7
This paper contributes to understanding the interplay of security notions for PKE, KEMs, and DEMs, in settings with multiple users, challenges, and instances. We start analytically by first studying (...
International Workshop on Temporal and Holistic User Modeling
International symposium on time the overall user modeling
2017/6/29
The importance of user modeling and personalization is taken for granted in several scenarios. According to this widespread paradigm, each user can be modeled through some (explicitly or implicitly ga...
A Secure User Authentication and Key Agreement Scheme for HWSN Tailored for the Internet of Things Environment
Internet of Things Wireless Sensor Networks Vulnerability
2017/6/22
Internet of things (IOT) is the term used to describe a world in which the things interact with other things through internet connection or communication means, share the information together and or p...
Hacking in the Blind: (Almost) Invisible Runtime User Interface Attacks
serious violations input integrity
2017/6/22
We describe novel, adaptive user interface attacks, where the adversary attaches a small device to the interface that connects user input peripherals to the target system. The device executes the atta...