Double-X: Towards Double-Cross-Based Unlock Mechanism on Smartphones

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:SEC (37. : 2022 : Kopenhagen; Online) ICT systems security and privacy protection
1. Verfasser: Li, Wenjuan (VerfasserIn)
Weitere Verfasser: Tan, Jiao (VerfasserIn), Zhu, Nan (VerfasserIn)
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2022
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
Robust PDF Files Forensics Using Coding Style 2022 Adhatarao, Supriya
FOCUS: Frequency Based Detection of Covert Ultrasonic Signals 2022 Hellemans, Wouter
Novel Approaches for the Development of Trusted IoT Entities 2022 Ferraris, Davide
Towards Supporting Attribute-Based Access Control in Hyperledger Fabric Blockchain 2022 Pericherla, Amshumaan
Light-Weight File Fragments Classification Using Depthwise Separable Convolutions 2022 Saaim, Kunwar Muhammed
Evaluation of Circuit Lifetimes in Tor 2022 Köster, Kevin
Requirements and Secure Serialization for Selective Disclosure Verifiable Credentials 2022 Kalos, Vasilis
A Study on the Use of 3rd Party DNS Resolvers for Malware Filtering or Censorship Circumvention 2022 Fejrskov, Martin
Data Minimisation Potential for Timestamps in Git: An Empirical Analysis of User Configurations 2022 Burkert, Christian
Upside Down: Exploring the Ecosystem of Dark Web Data Markets 2022 Covrig, Bogdan
Efficient Volume-Hiding Encrypted Multi-Maps with Support for Conjunctive Queries 2022 Li, Tianci
An Efficient Use-after-Free Mitigation Approach via Static Dangling Pointer Nullification 2022 Yu, Yue
D-Cloud-Collector: Admissible Forensic Evidence from Mobile Cloud Storage 2022 Vella, Mark
DAEMON: Dynamic Auto-encoders for Contextualised Anomaly Detection Applied to Security MONitoring 2022 Dey, Alexandre
A Privacy Calculus Model for Contact Tracing Apps: Analyzing the German Corona-Warn-App 2022 Harborth, David
Passive, Transparent, and Selective TLS Decryption for Network Security Monitoring 2022 Wilkens, Florian
AndroClonium: Bytecode-Level Code Clone Detection for Obfuscated Android Apps 2022 Foroughipour, Ardalan
One Light, One App: Tackling a Common Misperception Causing Breach of User Privacy 2022 Siapiti, Efi
Usability Insights from Establishing TLS Connections 2022 Kraus, Lydia
Double-X: Towards Double-Cross-Based Unlock Mechanism on Smartphones 2022 Li, Wenjuan
Alle Artikel auflisten