TG Tan, P Szalachowski, J Zhou - International Journal of Information …, 2022 - Springer
Public key cryptography is threatened by the advent of quantum computers. Using Shor's algorithm on a large-enough quantum computer, an attacker can cryptanalyze any …
DA Roberts, P Smets, M Collinge… - US Patent 10,909,531, 2021 - Google Patents
(57) ABSTRACT A mobile computing device has at least one processor and at least one memory together providing a first execution envi ronment and a second execution …
P Xu, R Sun, W Wang, T Chen, Y Zheng… - Future Generation …, 2021 - Elsevier
The FIDO2 protocol allows users to perform online authentication by setting a public key and avoids the shortcomings of the traditional password authentication mechanism in terms of …
Y Zhang, X Wang, Z Zhao, H Li - … of the Eighth ACM Conference on Data …, 2018 - dl.acm.org
FIDO protocols enable online services to leverage native authenticators of end-user computing devices including fingerprint readers for authentication to replace or complement …
I Teranishi, J Furukawa - US Patent 11,063,941, 2021 - Google Patents
An authentication system is provided with: a user device; user side assistance device (s) to assist user authentication that authenticates a user of the user device, and apparatus …
H Li, X Pan, X Wang, H Feng… - … and Mobile Computing, 2020 - Wiley Online Library
We present a novel attack named “Authenticator Rebinding Attack,” which aims at the Fast IDentity Online (FIDO) Universal Authentication Framework (UAF) protocol implemented on …
H Nishimura, Y Omori, T Yamashita… - … Conference on Mobile …, 2018 - ieeexplore.ieee.org
The public key based Web authentication can be securely implemented using modern mobile devices with a hardware-assisted trusted environment such as the Trusted Execution …
Y Sagae, A Nakamura, T Mori, Y Koshikiya… - Optical Fiber …, 2024 - opg.optica.org
Cryptographic Key Generation Using Conventional Single- Mode Fiber and an Optical Time Domain Reflectometer Page 1 Cryptographic Key Generation Using Conventional SingleMode …
H Kang, KH Lee, GJ Kim - Cluster Computing, 2019 - Springer
With the advancement of IT, users can now share and use a vast amount of information, but at the same time, their personal information has been widely used and made public. The …