Back to Results
First PageMeta Content
Malware / Cryptography / Backdoor / Rootkits / Spyware / Password / One-time password / SecurID / Security / Cyberwarfare / Computer security


A Framework to Eliminate Backdoors from Response-Computable Authentication Shuaifu Dai1 , Tao Wei1,2∗ , Chao Zhang1 , Tielei Wang3 , Yu Ding1 , Zhenkai Liang4 , Wei Zou1 1 Beijing Key Lab of Internet Security Technolo
Add to Reading List

Document Date: 2012-08-15 18:04:31


Open Document

File Size: 585,17 KB

Share Result on Facebook

Company

Intel / /

/

Facility

National University of Singapore / Internet Security Technology Institute of Computer Science / Georgia Institute of Technology / Berkeley College of Computing / Technology Peking University / University of California / /

IndustryTerm

login protocol / real-world applications / backdoors in software / large software systems / authentication systems / login systems / response computing functions / malicious developer / software testing process / weak cryptographic algorithm / normal response computing / response computing function / software isolation / weak cryptographic algorithms / pure computing scenarios / /

OperatingSystem

Linux / Ubuntu / POSIX / /

Organization

Peking University / National University of Singapore / Georgia Institute of Technology / School of Computing / Beijing Key Lab of Internet Security Technology Institute of Computer Science / University of California / Berkeley College of Computing / /

Position

*Corresponding author / assistant / /

ProgrammingLanguage

Java / R / /

ProvinceOrState

New Foundland and Labrador / California / /

Technology

cryptography / typical two-party login protocol / Java / Linux / weak cryptographic algorithm / operating system / weak cryptographic algorithms / /

SocialTag