Mobile devices are prevalently used to process sensitive data, but traditional encryption may not work when an adversary is able to coerce the device owners to disclose the encryption keys. Plausibly Deniable Encryption (PDE) is thus designed to protect sensitive data against this powerful adversary. In this paper, we present MobiPluto, a user-friendly PDE scheme for denying the existence of sensitive data stored on mobile devices. A salient difference between MobiPluto and the existing PDE systems is that any block-based file systems can be deployed on top of it. To further improve usability and deniability of MobiPluto, we introduce a fast switching mechanism and incorporate the widely-used Near Field Communication (NFC) technology. Users...
International audienceThe emergence of the NFC (Near Field Communication) technology brings new capa...
Today there exist a myriad of different types of physical access control systems (PACS) that use a s...
Comunicació presentada a: IEEE Conference on Communications and Network Security (CNS), celebrada a ...
Modern mobile devices are increasingly used to store and process sensitive data. In order to prevent...
Data confidentiality can be effectively preserved through encryption. In certain situations, this is...
We introduce MobiCeal, the first practical Plausibly Deniable Encryption (PDE) system for mobile dev...
Nowadays, mobile devices have been used broadly to store and process sensitive data. To ensure confi...
Sensitive data protection is essential for mobile users. Plausibly Deniable Encryption (PDE) systems...
I will introduce the progress of our work in building deniable storage systems for mobile devices. G...
Sensitive data protection is essential for mobile users. Plausibly Deniable Encryption (PDE) systems...
Sensitive data protection is vital for mobile users. An effective way is to store sensitive data in ...
Smartphones, and other mobile computing devices, are being widely adopted globally as the de-facto p...
<p>With the increasing popularity of Near field communication (NFC) in consumer-off-the-shelf device...
With the increasing popularity of Near field communication (NFC) in consumer-off-the-shelf devices, ...
Click on the DOI link to access the article (may not be free).The near field communication (NFC) tec...
International audienceThe emergence of the NFC (Near Field Communication) technology brings new capa...
Today there exist a myriad of different types of physical access control systems (PACS) that use a s...
Comunicació presentada a: IEEE Conference on Communications and Network Security (CNS), celebrada a ...
Modern mobile devices are increasingly used to store and process sensitive data. In order to prevent...
Data confidentiality can be effectively preserved through encryption. In certain situations, this is...
We introduce MobiCeal, the first practical Plausibly Deniable Encryption (PDE) system for mobile dev...
Nowadays, mobile devices have been used broadly to store and process sensitive data. To ensure confi...
Sensitive data protection is essential for mobile users. Plausibly Deniable Encryption (PDE) systems...
I will introduce the progress of our work in building deniable storage systems for mobile devices. G...
Sensitive data protection is essential for mobile users. Plausibly Deniable Encryption (PDE) systems...
Sensitive data protection is vital for mobile users. An effective way is to store sensitive data in ...
Smartphones, and other mobile computing devices, are being widely adopted globally as the de-facto p...
<p>With the increasing popularity of Near field communication (NFC) in consumer-off-the-shelf device...
With the increasing popularity of Near field communication (NFC) in consumer-off-the-shelf devices, ...
Click on the DOI link to access the article (may not be free).The near field communication (NFC) tec...
International audienceThe emergence of the NFC (Near Field Communication) technology brings new capa...
Today there exist a myriad of different types of physical access control systems (PACS) that use a s...
Comunicació presentada a: IEEE Conference on Communications and Network Security (CNS), celebrada a ...