[PDF][PDF] Smartphones as Practical and Secure Location Verification Tokens for Payments.

C Marforio, N Karapanos, C Soriente, K Kostiainen… - NDSS, 2014 - ethz.ch
We propose a novel location-based second-factor authentication solution for modern
smartphones. We demonstrate our solution in the context of point of sale transactions and …

Eternal sunshine of the spotless machine: Protecting privacy with ephemeral channels

AM Dunn, MZ Lee, S Jana, S Kim… - … USENIX Symposium on …, 2012 - usenix.org
Modern systems keep long memories. As we show in this paper, an adversary who gains
access to a Linux system, even one that implements secure deallocation, can recover the …

Emma: Hardware/software attestation framework for embedded systems using electromagnetic signals

N Sehatbakhsh, A Nazari, H Khan, A Zajic… - Proceedings of the …, 2019 - dl.acm.org
Establishing trust for an execution environment is an important problem, and practical
solutions for it rely on attestation, where an untrusted system (prover) computes a response …

Mandatory content access control for privacy protection in information centric networks

Q Li, R Sandhu, X Zhang, M Xu - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Several Information Centric Network (ICN) architectures have been proposed as candidates
for the future Internet, aiming to solve several salient problems in the current IP-based …

Caelus: Verifying the consistency of cloud services with battery-powered devices

BH Kim, D Lie - 2015 IEEE Symposium on Security and Privacy, 2015 - ieeexplore.ieee.org
Cloud storage services such as Amazon S3, Drop Box, Google Drive and Microsoft One
Drive have become increasingly popular. However, users may be reluctant to completely …

An efficient authentication system of smart device using multi factors in mobile cloud service architecture

YS Jeong, JS Park, JH Park - International Journal of …, 2015 - Wiley Online Library
Mobile cloud computing environments have overcome the performance limitation of mobile
devices and provide use environments not restricted by places. However, user information …

Deadbolt: locking down android disk encryption

A Skillen, D Barrera, PC Van Oorschot - … of the Third ACM workshop on …, 2013 - dl.acm.org
Android devices use volume encryption to protect private data storage. While this paradigm
has been widely adopted for safeguarding PC storage, the always-on mobile usage model …

[PDF][PDF] EVALUATION OF THE TPM USER AUTHENTICATION MODEL FOR TRUSTED COMPUTERS.

M ALSHAR'E, AM Zin, R Sulaiman… - Journal of Theoretical & …, 2015 - jatit.org
ABSTRACT A number of previous researchers have discussed the vulnerability of TPM to
physical attack and have proposed a number of solutions to solve these issues. Investigation …

[PDF][PDF] A user protection model for the trusted computing environment

MI Alshar'e, R Sulaiman, MR Mukhtar… - Journal of Computer …, 2014 - researchgate.net
Information security presents a huge challenge for both individuals and organizations. The
Trusted Computing Group (TCG) has introduced the Trusted Platform Module (TPM) as a …

Information processing device, authentication system, authentication device, information processing method, information processing program, recording medium, and …

H Takayama, H Matsushima, T Ito, T Haga… - US Patent …, 2013 - Google Patents
The present invention provides an information processing device, an authentication system,
etc. that save a server the trouble of updating a database, etc., even when a Software …