December 11, 2017
Comments Off on Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates
Posted in: IEEE 2017, Java
Security-Aware Relaying Scheme for Cooperative Networks With Untrusted Relay Nodes Abstract: This paper studies the problem of secure transmission in dual-hop cooperative networks with untrusted relays, where each relay acts as both a potential helper and an eavesdropper. A security-aware relaying scheme is proposed, which employs the alternate jamming and secrecy-enhanced relay selection to prevent […]
December 11, 2017
Comments Off on A Shoulder Surfing Resistant Graphical Authentication System
Posted in: IEEE 2017, Java
A Shoulder Surfing Resistant Graphical Authentication System Abstract Authentication based on passwords is used largely in applications for computer security and privacy. However, human actions such as choosing bad passwords and inputting passwords in an insecure way are regarded as ”the weakest link” in the authentication chain. Rather than arbitrary alphanumeric strings, users tend to choose passwords either […]