Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens.
Daniel DemmlerThomas SchneiderMichael ZohnerPublished in: USENIX Security Symposium (2014)
Keyphrases
- mobile devices
- embedded devices
- low cost
- mobile phone
- hardware implementation
- hardware platforms
- parallel computation
- real time
- mobile environments
- mobile learning
- hardware and software
- desktop computers
- location aware
- trusted computing
- computer systems
- security analysis
- mobile applications
- multi party
- mobile technologies
- personal computer
- mobile users
- context aware
- mobile computing
- line segments
- computing environments
- location based services
- computing devices
- key agreement protocol
- remote server