Outsider Key Compromise Impersonation Attack on a Multi-factor Authenticated Key Exchange Protocol

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:ACNS (20. : 2022 : Rom) Applied cryptography and network security workshops
1. Verfasser: Ma, Zhiqiang (VerfasserIn)
Weitere Verfasser: He, Jun (VerfasserIn)
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2022
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
On the Effect of Clock Frequency on Voltage and Electromagnetic Fault Injection 2022 Koffas, Stefanos
A Methodology for Training Homomorphic Encryption Friendly Neural Networks 2022 Baruch, Moran
Scalable and Secure HTML5 Canvas-Based User Authentication 2022 Rivera, Esteban
POSTER: Ransomware Detection Mechanism - Current State of the Project 2022 Glet, Michał
POSTER: Enabling User-Accountable Mechanisms in Decision Systems 2022 Giustolisi, Rosario
POSTER: ODABE: Outsourced Decentralized CP-ABE in Internet of Things 2022 Kamel, Mohammed B. M.
A Side-Channel Based Disassembler for the ARM-Cortex M0 2022 van Geest, Jurian
SuppliedTrust: A Trusted Blockchain Architecture for Supply Chains 2022 Lim, Yong Zhi
Output Prediction Attacks on Block Ciphers Using Deep Learning 2022 Kimura, Hayato
RATLS: Integrating Transport Layer Security with Remote Attestation 2022 Walther, Robert
DLPFS: The Data Leakage Prevention FileSystem 2022 Braghin, Stefano
The Etiology of Cybersecurity 2022 Ambrosi, Michele
POSTER: A Transparent Remote Quantum Random Number Generator over a Quantum-Safe Link 2022 Kozlovičs, Sergejs
Poster: Key Generation Scheme Based on Physical Layer 2022 Zhao, Hong
HolA: Holistic and Autonomous Attestation for IoT Networks 2022 Visintin, Alessandro
Efficient Verifiable Boolean Range Query for Light Clients on Blockchain Database 2022 Gong, Jianpeng
Towards Interpreting Vulnerability of Object Detection Models via Adversarial Distillation 2022 Zhang, Yaoyuan
Towards Isolated AI Accelerators with OP-TEE on SoC-FPGAs 2022 Nakai, Tsunato
S-box Pooling: Towards More Efficient Side-Channel Security Evaluations 2022 Zhou, Yuanyuan
Hybrid Isolation Model for Device Application Sandboxing Deployment in Zero Trust Architecture 2022 Zhang, Jingci
Alle Artikel auflisten