Articles with "secure two" as a keyword



Photo by kattrinnaaaaa from unsplash

A novel quantum scheme for secure two-party distance computation

Sign Up to like & get
recommendations!
Published in 2017 at "Quantum Information Processing"

DOI: 10.1007/s11128-017-1766-9

Abstract: Secure multiparty computational geometry is an essential field of secure multiparty computation, which computes a computation geometric problem without revealing any private information of each party. Secure two-party distance computation is a primitive of secure… read more here.

Keywords: computation; secure two; secure; party distance ... See more keywords
Photo by erol from unsplash

Partial Jamming for Secure Two-Way Relay Systems Without Wiretap Information: One > Two

Sign Up to like & get
recommendations!
Published in 2017 at "Wireless Personal Communications"

DOI: 10.1007/s11277-017-4037-2

Abstract: This paper investigates the issue that whether the jamming in the second time slot should be utilized for secure two-way amplify-and-forward relay systems. Particularly, a more realistic and severe scenario is considered: no information related… read more here.

Keywords: two way; information; one two; time slot ... See more keywords
Photo by adigold1 from unsplash

Rational adversary with flexible utility in secure two-party computation

Sign Up to like & get
recommendations!
Published in 2019 at "Journal of Ambient Intelligence and Humanized Computing"

DOI: 10.1007/s12652-017-0669-z

Abstract: Secure two-party computation evaluates a function among two distributed parties without revealing the parties’ inputs except for the function’s outputs. Secure two-party computation can be applied into various fields like cloud computing, which is a… read more here.

Keywords: party; party computation; secure two; rational adversary ... See more keywords
Photo from wikipedia

A Provably Secure Two-Factor Authentication Scheme for USB Storage Devices

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Transactions on Consumer Electronics"

DOI: 10.1109/tce.2020.3035566

Abstract: Universal Serial Bus (USB) is widely used, for example to facilitate hot-swapping and plug-and-play. However, USB ports can be exploited by an adversary to extract private or personal data from the connected devices. Hence, a… read more here.

Keywords: usb storage; two factor; scheme; secure two ... See more keywords
Photo from wikipedia

A Secure Two-Factor Authentication Scheme From Password-Protected Hardware Tokens

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Information Forensics and Security"

DOI: 10.1109/tifs.2022.3209886

Abstract: We investigate existing “password+hardware token”-based authentication schemes deployed in real-world applications and observe that they are vulnerable to critical threats. Specifically, a compromised manufacturer may issue a backdoored hardware token to a user and later… read more here.

Keywords: authentication; hardware; hardware tokens; secure two ... See more keywords