Sign Up to like & get
recommendations!
1
Published in 2017 at "Quantum Information Processing"
DOI: 10.1007/s11128-017-1766-9
Abstract: Secure multiparty computational geometry is an essential field of secure multiparty computation, which computes a computation geometric problem without revealing any private information of each party. Secure two-party distance computation is a primitive of secure…
read more here.
Keywords:
computation;
secure two;
secure;
party distance ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2017 at "Wireless Personal Communications"
DOI: 10.1007/s11277-017-4037-2
Abstract: This paper investigates the issue that whether the jamming in the second time slot should be utilized for secure two-way amplify-and-forward relay systems. Particularly, a more realistic and severe scenario is considered: no information related…
read more here.
Keywords:
two way;
information;
one two;
time slot ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2019 at "Journal of Ambient Intelligence and Humanized Computing"
DOI: 10.1007/s12652-017-0669-z
Abstract: Secure two-party computation evaluates a function among two distributed parties without revealing the parties’ inputs except for the function’s outputs. Secure two-party computation can be applied into various fields like cloud computing, which is a…
read more here.
Keywords:
party;
party computation;
secure two;
rational adversary ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2020 at "IEEE Transactions on Consumer Electronics"
DOI: 10.1109/tce.2020.3035566
Abstract: Universal Serial Bus (USB) is widely used, for example to facilitate hot-swapping and plug-and-play. However, USB ports can be exploited by an adversary to extract private or personal data from the connected devices. Hence, a…
read more here.
Keywords:
usb storage;
two factor;
scheme;
secure two ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Transactions on Information Forensics and Security"
DOI: 10.1109/tifs.2022.3209886
Abstract: We investigate existing “password+hardware token”-based authentication schemes deployed in real-world applications and observe that they are vulnerable to critical threats. Specifically, a compromised manufacturer may issue a backdoored hardware token to a user and later…
read more here.
Keywords:
authentication;
hardware;
hardware tokens;
secure two ... See more keywords