In this paper we first analyse the possibility for deniability under a strong adversary, who has an Internet-wide transcript of the communication. Secondly, we present a scheme which provides the desirable properties of previous messaging schemes, but with stronger deniability under the new adversary model. Our scheme requires physical meetings for exchanges of large amounts of random key-material via near-field communication and later uses this random data to key a one-time pad for text-messaging. We prove the correctness of the protocol and, finally, we evaluate the practical feasibility of the suggested scheme
People sometimes need to communicate directly with one another while concealing the communication it...
Near Field Communication (NFC) is a Radio Frequency (RF) technology that allows data to be exchanged...
Mobile devices are prevalently used to process sensitive data, but traditional encryption may not wo...
In this paper we first analyse the possibility for deniability under a strong adversary, who has an ...
Near Field Communication (NFC) is a promising short dis-tance radio communication technology for man...
Near Field Communication (NFC) specifies a standard for a wireless communication protocol enabling d...
Abstract. Traditionally, secure one-round key exchange protocols in the PKI setting have either achi...
Recently, due to the introduction of NFC (Near Field Communication), it has become possible to make ...
Click on the DOI link to access the article (may not be free).The near field communication (NFC) tec...
Near Field Communication} (NFC) is a Radio Frequency (RF) technology that allows data to be exchange...
Nowadays, near field communication (NFC) has been implemented in many fields such as ticketing, publ...
Click on the DOI link to access the article (may not be free).Due to the popularity of the Near Fiel...
This paper gives a comprehensive analysis of security with respect to NFC. We propose a protocol tha...
Abstract. Deniable authentication is a technique that allows one party to send messages to another w...
The notion of deniable encryption has been known in the literature since its introduction in [1] as ...
People sometimes need to communicate directly with one another while concealing the communication it...
Near Field Communication (NFC) is a Radio Frequency (RF) technology that allows data to be exchanged...
Mobile devices are prevalently used to process sensitive data, but traditional encryption may not wo...
In this paper we first analyse the possibility for deniability under a strong adversary, who has an ...
Near Field Communication (NFC) is a promising short dis-tance radio communication technology for man...
Near Field Communication (NFC) specifies a standard for a wireless communication protocol enabling d...
Abstract. Traditionally, secure one-round key exchange protocols in the PKI setting have either achi...
Recently, due to the introduction of NFC (Near Field Communication), it has become possible to make ...
Click on the DOI link to access the article (may not be free).The near field communication (NFC) tec...
Near Field Communication} (NFC) is a Radio Frequency (RF) technology that allows data to be exchange...
Nowadays, near field communication (NFC) has been implemented in many fields such as ticketing, publ...
Click on the DOI link to access the article (may not be free).Due to the popularity of the Near Fiel...
This paper gives a comprehensive analysis of security with respect to NFC. We propose a protocol tha...
Abstract. Deniable authentication is a technique that allows one party to send messages to another w...
The notion of deniable encryption has been known in the literature since its introduction in [1] as ...
People sometimes need to communicate directly with one another while concealing the communication it...
Near Field Communication (NFC) is a Radio Frequency (RF) technology that allows data to be exchanged...
Mobile devices are prevalently used to process sensitive data, but traditional encryption may not wo...