Traditional key stretching lacks a strict time guarantee due to the ease of parallelized password guessing by attackers. This paper introduces Sloth, a key stretching method leveraging the Secure Element (SE) commonly found in modern smartphones to provide a strict rate limit on password guessing. While this would be straightforward with full access to the SE, Android and iOS only provide a very limited API. Sloth utilizes the existing developer SE API and novel cryptographic constructions to build an effective rate-limit for password guessing on recent Android and iOS devices. Our approach ensures robust security even for short, randomly-generated, six-character alpha-numeric passwords against adversaries with virtually unlimited computing...
Modern mobile devices are increasingly used to store and process sensitive data. In order to prevent...
In this Paper [5], A highly severe menace to any computing device is the impersonation of an authent...
The current security on mobile devices is often limited to the Personal Identification Number (PIN),...
Mobile devices like smart phones and tablets are whirling into an automobile for prolific and gainfu...
In recent years, smartphones have become an increasingly important storage facility for personal sen...
We propose a threshold encryption scheme with two-party decryption, where one of the keyshares may b...
Data confidentiality can be effectively preserved through encryption. In certain situations, this is...
Mobile devices like smartphones and tablets are turning into a vehicle for productive and advantageo...
ABSTRACT: Securing mobile and smartphone data is vital issue in the communication industry and schem...
Mobile devices are prevalently used to process sensitive data, but traditional encryption may not wo...
I will introduce the progress of our work in building deniable storage systems for mobile devices. G...
Smartphones, and other mobile computing devices, are being widely adopted globally as the de-facto p...
Digital password lock has been commonly used on mobile devices as the primary authentication method....
Password-based single-sign-on authentication has been widely applied in mobile environments. It enab...
In this paper we propose a new scheme for ciphertext-policy attribute-based encryption that allows o...
Modern mobile devices are increasingly used to store and process sensitive data. In order to prevent...
In this Paper [5], A highly severe menace to any computing device is the impersonation of an authent...
The current security on mobile devices is often limited to the Personal Identification Number (PIN),...
Mobile devices like smart phones and tablets are whirling into an automobile for prolific and gainfu...
In recent years, smartphones have become an increasingly important storage facility for personal sen...
We propose a threshold encryption scheme with two-party decryption, where one of the keyshares may b...
Data confidentiality can be effectively preserved through encryption. In certain situations, this is...
Mobile devices like smartphones and tablets are turning into a vehicle for productive and advantageo...
ABSTRACT: Securing mobile and smartphone data is vital issue in the communication industry and schem...
Mobile devices are prevalently used to process sensitive data, but traditional encryption may not wo...
I will introduce the progress of our work in building deniable storage systems for mobile devices. G...
Smartphones, and other mobile computing devices, are being widely adopted globally as the de-facto p...
Digital password lock has been commonly used on mobile devices as the primary authentication method....
Password-based single-sign-on authentication has been widely applied in mobile environments. It enab...
In this paper we propose a new scheme for ciphertext-policy attribute-based encryption that allows o...
Modern mobile devices are increasingly used to store and process sensitive data. In order to prevent...
In this Paper [5], A highly severe menace to any computing device is the impersonation of an authent...
The current security on mobile devices is often limited to the Personal Identification Number (PIN),...