Zobrazeno 1 - 8
of 8
pro vyhledávání: '"Blessing, Jenny"'
The advent of end-to-end encrypted (E2EE) messaging and backup services has brought new challenges for usable authentication. Compared to regular web services, the nature of E2EE implies that the provider cannot recover data for users who have forgot
Externí odkaz:
http://arxiv.org/abs/2406.18226
While text-based machine learning models that operate on visual inputs of rendered text have become robust against a wide range of existing attacks, we show that they are still vulnerable to visual adversarial examples encoded as text. We use the Uni
Externí odkaz:
http://arxiv.org/abs/2306.07033
Autor:
Blessing, Jenny, Anderson, Ross
European lawmakers have ruled that users on different platforms should be able to exchange messages with each other. Yet messaging interoperability opens up a Pandora's box of security and privacy challenges. While championed not just as an anti-trus
Externí odkaz:
http://arxiv.org/abs/2303.14178
Autor:
Chowdhury, Partha Das, Sameen, Maria, Blessing, Jenny, Boucher, Nicholas, Gardiner, Joseph, Burrows, Tom, Anderson, Ross, Rashid, Awais
Threat modelling is foundational to secure systems engineering and should be done in consideration of the context within which systems operate. On the other hand, the continuous evolution of both the technical sophistication of threats and the system
Externí odkaz:
http://arxiv.org/abs/2301.05653
Autor:
Blessing, Jenny
This thesis provides empirical metrics for different vectors for vulnerability introduction, with a particular focus on cryptographic software. Through quantitative analysis of source code and vulnerability metrics from a variety of cryptographic lib
Externí odkaz:
https://hdl.handle.net/1721.1/139005
The security of the Internet rests on a small number of open-source cryptographic libraries: a vulnerability in any one of them threatens to compromise a significant percentage of web traffic. Despite this potential for security impact, the character
Externí odkaz:
http://arxiv.org/abs/2107.04940
Voting by mail has been gaining traction for decades in the United States and has emerged as the preferred voting method during the COVID-19 pandemic. In this paper, we examine the security of electronic systems used in the process of voting by mail,
Externí odkaz:
http://arxiv.org/abs/2005.08427
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.