June 2020
·
66 Reads
·
3 Citations
This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.
June 2020
·
66 Reads
·
3 Citations
April 2018
·
245 Reads
·
105 Citations
May 2017
·
127 Reads
·
35 Citations
April 2017
·
307 Reads
·
71 Citations
August 2016
·
2 Reads
·
5 Citations
March 2016
·
140 Reads
·
68 Citations
March 2016
·
36 Reads
·
30 Citations
September 2015
·
52 Reads
·
15 Citations
... To address a part of the issues recognized in many distributed storage structures, various plans have been proposed, for instance, setting up, by the distributed storage providers, an equality between customer security and learning amassed from customers' data [1], realizing a crossbreed encryption and access control scheme that will ensure an occupation based access control [2] or despite depicting a nonexclusive arrangement of activity in which the encryption and deciphering organizations are segregated from capacity advantage [3]. There are similarly extraordinary courses of action proposed starting late, as showed in papers [4][5][6][7][8][9]. Notwithstanding the way that these courses of action can upgrade the security dimension of a distributed storage system, there is so far a prerequisite for a customer to trust in a provider. ...
August 2016
... Another body of work investigates the security and deployment of email encryption mechanisms, such as PGP [34], [35], [36], [37], [38], DANE [39], [40], and STARTTLS [41], [42], [43], [44], [45]. ...
June 2020
... By embedding the IPNS key within images, audio files, or other media, the secret can be transmitted without arousing suspicion. Another mechanism is to leverage encrypted messaging applications that provide end-to-end encryption and forward secrecy, such as Signal or WhatsApp [91]- [93]. These platforms are designed to resist surveillance and interception, making them suitable for securely transmitting the IPNS key and root certificate [94]. ...
April 2018
... 2. OpenID Connect: this is an interoperable authentication protocol, which is developed based on the OAuth 2.0 framework of specifications (Alrodhan and Alqarni 2017;Mainka et al. 2017;Naik and Jenkins 2017). Ope-nID Connect streamlines the process of obtaining user profile data in a REST-like and interoperable manner, as well as user identity verification based on authentication carried out by an authorisation server. ...
April 2017
... Moreover, due to the diversity of application scenarios and functional requirements, specific types of IoT devices may suffer from their own security issues. Hence, some work [62], [63], [64] has analyzed the security of specific IoT devices, including smart locks, printers and home-based devices, etc. In addition, some researchers also considered the security of communication between devices, clouds and apps, such as remote binding [32], device pairing [65], [66], messaging protocols [67] and the interactions [68]. ...
May 2017
... Smart TV, connected to the Internet, may create security and privacy issue for users due to hackers, scammers, spammers, etc. (Ksibi et al., 2021;Niemietz et al., 2015). Privacy and security issues are critical for lifelogging systems Ksibi et al., 2021;Petroulakis et al., 2012). ...
September 2015
... As a result, if an assertion is still true and pertinent, it should be cached and utilised again. This can accelerate the authenticate process, lessen the strain on the IdP, and enhance customer satisfaction (Mainka et al. 2016). (d) For SAML to be efficient, both the IdP and the SP must be accessible and dependable. ...
March 2016
... Frosch et al. 19 first provided a comprehensive and accurate description of interaction process of the TextSecure protocol and conducted a security analysis. They established formal security definitions and security proof for the three component modules of the protocol and found that it was vulnerable to a UKS attack. ...
March 2016