Establishing a secure communication channel between two parties is a nontrivial problem, especially when one or both are humans. Unlike computers, humans cannot perform strong cryptographic operations without supporting technology, yet this technology may itself be compromised. We introduce a general communication topology model to facilitate the analysis of security protocols in this setting. We use it to completely characterize all topologies that allow secure communication between a human and a remote server via a compromised computer. These topologies are relevant for a variety of applications, including online banking and Internet voting. Our characterization can serve to guide the design of novel solutions for applications and to quic...
A significant characteristic of pervasive computing is the need for secure interactions between high...
A significant characteristic of pervasive computing is the need for secure interactions between high...
We propose the first user authentication and key exchange protocols that can tolerate strong corrupt...
Establishing a secure communication channel between two parties is a nontrivial problem, especially ...
Establishing a secure communication channel between two parties is a nontrivial problem, especially ...
Abstract—Establishing a secure communication channel be-tween two parties is a nontrivial problem, e...
We blend research from human-computer interface (HCI) design with computational based crypto- graphi...
We propose a formal model to analyze security protocols with human interaction. We model humans with...
We blend research from human-computer interface\ud (HCI) design with computational based crypto-\ud ...
This paper is a preliminary exploration of secure distributed human computation. We consider the gen...
Abstract. We re-examine the needs of computer security in pervasive computing from first principles,...
Abstract. This paper introduces a line of research on secure distributed human computation. We consi...
Presented on March 10, 2017 at 12:00 p.m. in t he Klaus Advanced Computer Building, Room 1116W.Shan ...
This article discusses the design of the secure data transfer scheme between users using peer-to-pee...
This article discusses the design of the secure data transfer scheme between users using peer-to-pee...
A significant characteristic of pervasive computing is the need for secure interactions between high...
A significant characteristic of pervasive computing is the need for secure interactions between high...
We propose the first user authentication and key exchange protocols that can tolerate strong corrupt...
Establishing a secure communication channel between two parties is a nontrivial problem, especially ...
Establishing a secure communication channel between two parties is a nontrivial problem, especially ...
Abstract—Establishing a secure communication channel be-tween two parties is a nontrivial problem, e...
We blend research from human-computer interface (HCI) design with computational based crypto- graphi...
We propose a formal model to analyze security protocols with human interaction. We model humans with...
We blend research from human-computer interface\ud (HCI) design with computational based crypto-\ud ...
This paper is a preliminary exploration of secure distributed human computation. We consider the gen...
Abstract. We re-examine the needs of computer security in pervasive computing from first principles,...
Abstract. This paper introduces a line of research on secure distributed human computation. We consi...
Presented on March 10, 2017 at 12:00 p.m. in t he Klaus Advanced Computer Building, Room 1116W.Shan ...
This article discusses the design of the secure data transfer scheme between users using peer-to-pee...
This article discusses the design of the secure data transfer scheme between users using peer-to-pee...
A significant characteristic of pervasive computing is the need for secure interactions between high...
A significant characteristic of pervasive computing is the need for secure interactions between high...
We propose the first user authentication and key exchange protocols that can tolerate strong corrupt...