Category: Java

Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates

Security-Aware Relaying Scheme for Cooperative Networks With Untrusted Relay Nodes Abstract: This paper studies the problem of secure transmission in dual-hop cooperative networks with untrusted relays, where each relay acts as both a potential helper and an eavesdropper. A security-aware relaying scheme is proposed, which employs the alternate jamming and secrecy-enhanced relay selection to prevent […]


A Shoulder Surfing Resistant Graphical Authentication System

A Shoulder Surfing Resistant Graphical Authentication System Abstract Authentication based on passwords is used largely in applications for computer security and privacy. However, human actions such as choosing bad passwords and inputting passwords in an insecure way are regarded as ”the weakest link” in the authentication chain. Rather than arbitrary alphanumeric strings, users tend to choose passwords either […]