Existing 2D e-commerce internet websites provide users with only relatively simple, browser-based interface to access available products and services. These websites often lack in...
We consider two-party quantum protocols starting with a transmission of some random BB84 qubits followed by classical messages. We show a general “compiler” improving the secur...
To increase the security of handheld devices, we propose awareLESS authentication. Since insensible input prevents the leakage of the key information, it can provide more secure a...
To counter the increasing number of online threats for users' privacy and security, this paper explores the design of an ambient security indicator, in form of a standard key...
Alexander De Luca, Bernhard Frauendienst, Max-Eman...
Text passwords are the primary authentication method used for most online services. Many online users select weak passwords. Regrettably, most proposed methods of strengthening pa...