搜索结果: 1-3 共查到“军队指挥学 PIN”相关记录3条 . 查询时间(0.241 秒)
There Goes Your PIN: Exploiting Smartphone Sensor Fusion Under Single and Cross User Setting
Smartphones PIN Sensor
2017/12/6
A range of zero-permission sensors are found in modern smartphones to enhance user experience. These sensors can lead to unintentional leakage of user private data. In this paper, we combine leakage f...
Breaking RSA-based PIN Encryption with thirty ciphertext validity queries
RSA-based PIN Encryption thirty ciphertext validity queries validity checking oracle
2009/7/14
We show that one can recover the PIN from a standardised
RSA-based PIN encryption algorithm from a small number of queries to a
ciphertext validity checking oracle. The validity checking oracle requ...
Authenticated ID-based Key Exchange and remote log-in with simple token and PIN number
Authenticated key exchange pairing-based cryptosystems
2009/4/15
Authenticated key exchange protocols tend to be either to-
ken based or password based. Token based schemes are often based on
expensive (and irreplaceable) smart-card tokens, while password-only
s...