搜索结果: 1-15 共查到“End-to-End”相关记录39条 . 查询时间(0.076 秒)
Traceback for End-to-End Encrypted Messaging
end-to-end encrypted messaging anonymity tracing abuse reporting
2019/8/30
Messaging systems are used to spread misinformation and other malicious content, often with dire consequences. End-to-end encryption improves privacy but hinders content-based moderation and, in parti...
Simple and Efficient Approach for Achieving End-to-End Anonymous Communication
cryptographic protocols Anonymous communication
2019/7/15
Anonymous communication, that is secure end-to-end and unlinkable, plays a critical role in protecting user privacy by preventing service providers from using message metadata to discover communicatio...
Asymmetric Message Franking: Content Moderation for Metadata-Private End-to-End Encryption
message franking designated verifier signatures deniability
2019/5/28
Content moderation is crucial for stopping abuse and harassment via messaging on online platforms. Existing moderation mechanisms, such as message franking, require platform providers to see user iden...
End-to-End Secure Mobile Group Messaging with Conversation Integrity and Deniability
secure messaging mobile messaging
2018/11/16
In this paper, we describe Mobile CoWPI, a deployable, end-to-end secure mobile group messaging application with proofs of security. Mobile CoWPI allows dynamic groups of users to participate in, join...
An End-to-End System for Large Scale P2P MPC-as-a-Service and Low-Bandwidth MPC for Weak Participants
cryptographic protocols secure multiparty computation
2018/8/21
Protocols for secure multiparty computation enable a set of parties to compute a joint function of their inputs, while preserving \emph{privacy}, \emph{correctness} and more. In theory, secure computa...
We present Steady: an end-to-end secure logging system engineered to be simple in terms of design, implementation, and assumptions for real-world use. Steady gets its name from being based on a steady...
Breaking Message Integrity of an End-to-End Encryption Scheme of LINE
E2EE LINE key exchange
2018/7/16
In this paper, we analyze the security of an end-to-end encryption scheme (E2EE) of LINE, a.k.a Letter Sealing. LINE is one of the most widely-deployed instant messaging applications, especially in Ea...
A secure end-to-end verifiable e-voting system using zero knowledge based blockchain
E-voting Blockchain Direct Record Electronic Authentication
2018/5/22
In this paper, we present a cryptographic technique for an authenticated, end-to-end verifiable and secret ballot election. Voters should receive assurance that their vote is cast as intended, recorde...
Two-Factor Authentication with End-to-End Password Security
password authentication two-factor authentication short authenticated string model
2018/1/11
We present a secure two-factor authentication (TFA) scheme based on the possession by the user of a password and a crypto-capable device. Security is ``end-to-end" in the sense that the attacker can a...
IntegriKey: End-to-End Integrity Protection of User Input
End-to-End Integrity Protection User Input
2018/1/2
Networked critical systems, such as Programmable Logic Controllers in a factory plant, are often remotely configurable by administrators through web-based interfaces. However, administrative host mach...
第一届E2E机器学习数据管理研讨会(1st Workshop on Data Management for End-to-End Machine Learning)
第一届 E2E 机器学习 数据管理 研讨会
2017/4/25
The DEEM workshop will be held in conjunction with SIGMOD/PODS 2017. DEEM brings together researchers and practitioners at the intersection of applied machine learning, data management and systems res...
Apollo - End-to-end Verifiable Internet Voting with Recovery from Vote Manipulation
cryptographic protocols evoting
2016/12/7
We present security vulnerabilities in the remote voting system Helios. We propose Apollo, a modified version of Helios, which addresses these vulnerabilities and could improve the feasibility of inte...
FROM UAS DATA ACQUISITION TO ACTIONABLE INFORMATION–HOW AN END-TO-END SOLUTION HELPS OIL PALM PLANTATION OPERATORS TO PERFORM A MORE SUSTAINABLE PLANTATION MANAGEMENT
UAS GNSS base line processing Oil Palm Plantations Object-based image analysis Sustainable forestry
2016/7/5
Palm oil represents the most efficient oilseed crop in the world but the production of palm oil involves plantation operations in one of the most fragile environments - the tropical lowlands. Deforest...
End-to-End Verifiable Elections in the Standard Model
e-voting standard model, end-to-end verificable
2015/12/31
We present the cryptographic implementation of “DEMOS”, a new e-voting system that is endto-end
verifiable in the standard model, i.e., without any additional “setup” assumption or access
to a rando...
Efficient Key Authentication Service for Secure End-to-end Communications
Certificate transparency End-to-end encryption Key authentication
2015/12/23
After four decades of public key cryptography, both the industry and academia seek better solutions
for the public key infrastructure. A recent proposal, the certificate transparency concept, tries t...