Wave-to-Access: Protecting Sensitive Mobile Device Services via a Hand Waving Gesture (English)
- New search for: Shrestha, Babins
- New search for: Saxena, Nitesh
- New search for: Harrison, Justin
- New search for: Shrestha, Babins
- New search for: Saxena, Nitesh
- New search for: Harrison, Justin
In:
CANS, International Conference on Cryptology and Network Security, 12
;
199-217
;
2013
-
ISSN:
- Conference paper / Print
-
Title:Wave-to-Access: Protecting Sensitive Mobile Device Services via a Hand Waving Gesture
-
Contributors:
-
Published in:Lecture Notes in Computer Science ; 8257 ; 199-217
-
Publisher:
- New search for: Springer International Publishing
-
Place of publication:Cham
-
Publication date:2013
-
Size:19 Seiten
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Conference paper
-
Type of material:Print
-
Language:English
-
Keywords:
-
Source:
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Differential Attacks on Generalized Feistel SchemesNachef, V. / Volte, E. / Patarin, J. et al. | 2013
- 20
-
Revisiting MAC Forgeries, Weak Keys and Provable Security of Galois/Counter Mode of OperationZhu, B. / Tan, Y. / Gong, G. et al. | 2013
- 39
-
Padding Oracle Attack on PKCS#1 v1.5: Can Non-standard Implementation Act as a Shelter?Gao, S. / Chen, H. / Fan, L. et al. | 2013
- 57
-
Zero Knowledge Proofs from Ring-LWEXie, X. / Xue, R. / Wang, M. et al. | 2013
- 74
-
Zero Knowledge with Rubik's Cubes and Non-abelian GroupsVolte, E. / Patarin, J. / Nachef, V. et al. | 2013
- 92
-
Efficient Modular NIZK Arguments from Shift and ProductFauzi, P. / Lipmaa, H. / Zhang, B. et al. | 2013
- 122
-
Strongly Secure One-Round Group Authenticated Key Exchange in the Standard ModelLi, Y. / Yang, Z. et al. | 2013
- 139
-
Achieving Correctness in Fair Rational Secret SharingDe, S.J. / Pal, A.K. et al. | 2013
- 162
-
BotSuer: Suing Stealthy P2P Bots in Network Traffic through Netflow AnalysisKheir, N. / Wolley, C. et al. | 2013
- 179
-
Resource Access Control in the Facebook ModelChronopoulos, K. / Gouseti, M. / Kiayias, A. et al. | 2013
- 199
-
Wave-to-Access: Protecting Sensitive Mobile Device Services via a Hand Waving GestureShrestha, B. / Saxena, N. / Harrison, J. et al. | 2013
- 218
-
Semantically-Secure Functional Encryption: Possibility Results, Impossibility Results and the Quest for a General DefinitionBellare, M. / O Neill, A. et al. | 2013
- 235
-
Efficient Lossy Trapdoor Functions Based on Subgroup Membership AssumptionsXue, H. / Li, B. / Lu, X. / Jia, D. / Liu, Y. et al. | 2013
- 251
-
Unique Aggregate Signatures with Applications to Distributed Verifiable Random FunctionsKuchta, V. / Manulis, M. et al. | 2013
- 271
-
A Practical Related-Key Boomerang Attack for the Full MMB Block CipherAshur, T. / Dunkelman, O. et al. | 2013
- 291
-
Truncated Differential Analysis of Reduced-Round LBlockEmami, S. / McDonald, C. / Pieprzyk, J. / Steinfeld, R. et al. | 2013
- 309
-
How to Update Documents Verifiably in Searchable Symmetric EncryptionKurosawa, K. / Ohtaki, Y. et al. | 2013
- 329
-
Private Outsourcing of Polynomial Evaluation and Matrix Multiplication Using Multilinear MapsZhang, L.F. / Safavi-Naini, R. et al. | 2013