Loading…
Loading…
Q-CSKDF: A Continuous and Security Key Derivation Function for Quantum Key Distribution
Chen, Lutong, Xue, Kaiping, Li, Jian, Li, Zhonghui, Yu, Nenghai
Published in IEEE network (01.09.2024)
Published in IEEE network (01.09.2024)
Get full text
Journal Article
Loading…
Loading…
Loading…
Computational fuzzy extractors
Fuller, Benjamin, Meng, Xianrui, Reyzin, Leonid
Published in Information and computation (01.12.2020)
Published in Information and computation (01.12.2020)
Get full text
Journal Article
Loading…
Cross-Modality Continuous User Authentication and Device Pairing With Respiratory Patterns
Islam, Shekh M. M., Zheng, Yao, Pan, Yanjun, Millan, Marionne, Chang, Willy, Li, Ming, Boric-Lubecke, Olga, Lubecke, Victor, Sun, Wenhai
Published in IEEE internet of things journal (15.08.2023)
Published in IEEE internet of things journal (15.08.2023)
Get full text
Journal Article
Loading…
System and method for enforcement of correctness for key derivation
Year of Publication 21.04.2020
Get full text
Patent
Loading…
PARAMETER BASED KEY DERIVATION AND RESOURCE ACCESS DELEGATION
O'NEILL, Kevin Ross, ROTH, Gregory B, FITCH, Nathan R, CRAHEN, Eric D, ILAC, Christian M, BEHM, Bradley Jeffery, BRANDWINE, Eric Jason
Year of Publication 05.06.2019
Get full text
Year of Publication 05.06.2019
Patent
Loading…
SYSTEM AND METHOD FOR ENFORCEMENT OF CORRECTNESS FOR KEY DERIVATION
Year of Publication 08.11.2018
Get full text
Patent
Loading…
On the Weaknesses of PBKDF2
Visconti, Andrea, Bossi, Simone, Ragab, Hany, Calò, Alexandro
Published in Cryptology and Network Security (2015)
Published in Cryptology and Network Security (2015)
Get full text
Book Chapter
Loading…
Empowering Owners with Control in Digital Data Markets
De Capitani di Vimercati, Sabrina, Foresti, Sara, Livraga, Giovanni, Samarati, Pierangela
Published in IEEE ... International Conference on Cloud Computing (01.07.2019)
Published in IEEE ... International Conference on Cloud Computing (01.07.2019)
Get full text
Conference Proceeding
Loading…
Computational Fuzzy Extractors
Fuller, Benjamin, Meng, Xianrui, Reyzin, Leonid
Published in Advances in Cryptology - ASIACRYPT 2013 (2013)
Published in Advances in Cryptology - ASIACRYPT 2013 (2013)
Get full text
Book Chapter
Loading…
NACDA: Naming-Based Access Control and Decentralized Authorization for Secure Many-to-Many Data Sharing
Li, Minghui, Xue, Jingfeng, Wang, Yong, Ma, Rui, Huo, Wei
Published in Electronics (Basel) (01.04.2023)
Published in Electronics (Basel) (01.04.2023)
Get full text
Journal Article
Loading…
Burnable Pseudo-Identity: A Non-Binding Anonymous Identity Method for Ethereum
Gutierrez-Aguero, Ivan, Anguita, Sergio, Larrucea, Xabier, Gomez-Goiri, Aitor, Urquizu, Borja
Published in IEEE access (2021)
Published in IEEE access (2021)
Get full text
Journal Article
Loading…
Loading…
Loading…
Access Control as a Service for Public Cloud Storage
Yang Zhang, Jun-Liang Chen
Published in 2012 32nd International Conference on Distributed Computing Systems Workshops (01.06.2012)
Published in 2012 32nd International Conference on Distributed Computing Systems Workshops (01.06.2012)
Get full text
Conference Proceeding
Loading…