搜索结果: 1-15 共查到“军事学 mobile”相关记录62条 . 查询时间(0.078 秒)
Security Reductions for White-Box Key-Storage in Mobile Payments
White-box cryptography secure key storage hardware-binding
font style='font-size:12px;'>
2019/9/16
The goal of white-box cryptography is to provide security even when the cryptographic implementation is executed in adversarially controlled environments. White-box implementations nowadays appear in ...
PrivFL: Practical Privacy-preserving Federated Regressions on High-dimensional Data over Mobile Networks
Privacy-preserving computations Predictive analysis Federated learning
font style='font-size:12px;'>
2019/8/30
Federated Learning (FL) enables a large number of users to jointly learn a shared machine learning (ML) model, coordinated by a centralized server, where the data is distributed across multiple device...
Mobile Private Contact Discovery at Scale
Private Contact Discovery Private Set Intersection Oblivious Pseudorandom Function
font style='font-size:12px;'>
2019/5/21
Mobile messengers like WhatsApp perform contact discovery by uploading the user's entire address book to the service provider. This allows the service provider to determine which of the user's contact...
End-to-End Secure Mobile Group Messaging with Conversation Integrity and Deniability
secure messaging mobile messaging
font style='font-size:12px;'>
2018/11/16
In this paper, we describe Mobile CoWPI, a deployable, end-to-end secure mobile group messaging application with proofs of security. Mobile CoWPI allows dynamic groups of users to participate in, join...
S-Mbank: Secure Mobile Banking Authentication Scheme Using Signcryption, Pair Based Text Authentication, and Contactless Smartcard
Secure mobile banking Two factor authentication Mutual authentication
font style='font-size:12px;'>
2018/11/13
Nowadays, mobile banking becomes a popular tool which consumers can conduct financial transactions such as shopping, monitoring accounts balance, transferring funds and other payments. Consumers depen...
Identity Confidentiality in 5G Mobile Telephony Systems
Anonymity Privacy 5G
font style='font-size:12px;'>
2018/11/13
The 3rd Generation Partnership Project (3GPP) recently proposed a standard for 5G telecommunications, containing an identity protection scheme meant to address the long-outstanding privacy problem of ...
Private Set Intersection for Unequal Set Sizes with Mobile Applications
Private set intersection Bloom filter oblivious pseudorandom function
font style='font-size:12px;'>
2017/7/11
Private set intersection (PSI) is a cryptographic technique that is applicable to many privacy-sensitive scenarios. For decades, researchers have been focusing on improving its efficiency in both comm...
Multimodal Indexable Encryption for Mobile Cloud-based Applications (Extended Version)
Searchable Encryption Multimodal Data
font style='font-size:12px;'>
2017/4/17
In this paper we propose MIE, a Multimodal Indexable Encryption framework that for the first time allows mobile applications to securely outsource the storage and search of their multimodal data (i.e....
A Decentralized PKI In A Mobile Ecosystem
PKI GSM
font style='font-size:12px;'>
2017/2/20
A public key infrastructure (PKI) supports the authentication and distribution of public encryption keys, enabling secure communication among other uses. However, PKIs rely heavily on a centralized tr...
Mobile Commerce: Secure Multi-party Computation & Financial Cryptography
Secure multi-party computation Financial cryptography Mobile commerce mechanism
font style='font-size:12px;'>
2016/12/29
The basic objective of this work is to construct an efficient and secure mechanism for mobile
commerce applying the concept of financial cryptography and secure multi-party computation. The
mechanis...
AEP-M: Practical Anonymous E-Payment for Mobile Devices using ARM TrustZone and Divisible E-Cash (Full Version)
E-Payment Privacy Mobile Devices TrustZone
font style='font-size:12px;'>
2016/5/23
Electronic payment (e-payment) has been widely applied to electronic commerce and has especially attracted a large number of mobile users. However, current solutions often focus on protecting users' m...
ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels
side-channel attack elliptic curve cryptography electromagnetic analysis
font style='font-size:12px;'>
2016/3/3
We show that elliptic-curve cryptography implementations on mobile devices are vulnerable
to electromagnetic and power side-channel attacks. We demonstrate full extraction of ECDSA
secret signing ke...
Randomized and Efficient Authentication in Mobile Environments
applications authentication
font style='font-size:12px;'>
2016/1/26
In a mobile environment, a number of users act as a network nodes and communicate with one
another to acquire location based information and services. This emerging paradigm has opened up
new busine...
Whitewash: Outsourcing Garbled Circuit Generation for Mobile Devices
server-aided cryptography multi-party computation garbled circuits
font style='font-size:12px;'>
2016/1/23
Garbled circuits offer a powerful primitive for computation on a user’s personal data while keeping that data private. Despite recent improvements, constructing and evaluating circuits of any useful ...
Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens
secure computation smart cards implementation
font style='font-size:12px;'>
2016/1/9
Secure two-party computation allows two mutually distrusting parties to jointly compute an arbitrary function on their private inputs without revealing anything but the result. An interesting target f...