We blend research from human-computer interface\ud (HCI) design with computational based crypto-\ud graphic provable security. We explore the notion of\ud practice-oriented provable security (POPS), moving\ud the focus to a higher level of abstraction (POPS+)\ud for use in providing provable security for security\ud ceremonies involving humans. In doing so we high-\ud light some challenges and paradigm shifts required to\ud achieve meaningful provable security for a protocol\ud which includes a human. We move the focus of security ceremonies from being protocols in their context\ud of use, to the protocols being cryptographic building\ud blocks in a higher level protocol (the security cere-\ud mony), which POPS can be applied to. In order t...
The popularity of personal computing devices (e.g. smart cards) exposes users to risks, notably iden...
The standard solution for mutual authentication between human users and servers on the internet is t...
Abstract. One interesting and important challenge for the cryptologic community is that of providing...
We blend research from human-computer interface (HCI) design with computational based crypto- graphi...
Abstract. We re-examine the needs of computer security in pervasive computing from first principles,...
Abstract: "We introduce a protocol for authentication between a human and a computer, where the huma...
Abstract. This paper introduces a line of research on secure distributed human computation. We consi...
The popularity of personal computing devices (e.g. smart cards) exposes users to risks, notably iden...
This paper is a preliminary exploration of secure distributed human computation. We consider the gen...
A fundamental part of many authentication protocols which authenticate a party to a human involves t...
Presented on March 10, 2017 at 12:00 p.m. in t he Klaus Advanced Computer Building, Room 1116W.Shan ...
Establishing a secure communication channel between two parties is a nontrivial problem, especially ...
Establishing a secure communication channel between two parties is a nontrivial problem, especially ...
Abstract. Forgery and counterfeiting are emerging as serious security risks in low-cost pervasive co...
Establishing a secure communication channel between two parties is a nontrivial problem, especially ...
The popularity of personal computing devices (e.g. smart cards) exposes users to risks, notably iden...
The standard solution for mutual authentication between human users and servers on the internet is t...
Abstract. One interesting and important challenge for the cryptologic community is that of providing...
We blend research from human-computer interface (HCI) design with computational based crypto- graphi...
Abstract. We re-examine the needs of computer security in pervasive computing from first principles,...
Abstract: "We introduce a protocol for authentication between a human and a computer, where the huma...
Abstract. This paper introduces a line of research on secure distributed human computation. We consi...
The popularity of personal computing devices (e.g. smart cards) exposes users to risks, notably iden...
This paper is a preliminary exploration of secure distributed human computation. We consider the gen...
A fundamental part of many authentication protocols which authenticate a party to a human involves t...
Presented on March 10, 2017 at 12:00 p.m. in t he Klaus Advanced Computer Building, Room 1116W.Shan ...
Establishing a secure communication channel between two parties is a nontrivial problem, especially ...
Establishing a secure communication channel between two parties is a nontrivial problem, especially ...
Abstract. Forgery and counterfeiting are emerging as serious security risks in low-cost pervasive co...
Establishing a secure communication channel between two parties is a nontrivial problem, especially ...
The popularity of personal computing devices (e.g. smart cards) exposes users to risks, notably iden...
The standard solution for mutual authentication between human users and servers on the internet is t...
Abstract. One interesting and important challenge for the cryptologic community is that of providing...