نتایج جستجو برای: keychain

تعداد نتایج: 35  

Journal: :Journal of Indian Orthodontic Society 2019

2011
Jens Heider Matthias Boll

The paper highlights risks that accompany losing a locked iOS device regarding confidentiality of passwords stored in the keychain. It presents results of handson tests that show the possibility for attackers to reveal some of the keychain entries. For the described approach, the knowledge of the user’s secret passcode is not needed, as the protection provided by the passcode is bypassed.

2012
Jens Heider Rachid El Khayari

This paper summarizes answers to frequently asked questions about the iOS keychain weakness described in [HB11]. It provides further information for security evaluators on the impact of the findings.

Journal: :Journal of Global Oncology 2018

Journal: :Inf. Sci. 2004
Venkat Murali

A natural equivalence relation on the set of all fuzzy subsets, generalizing the equality of crisp sets, was recently introduced and studied in various contexts such as finite fuzzy subsets, fuzzy vector space, finite fuzzy subfields and in the classification of finite Abelian groups. In this paper, we restrict this equivalence to the set of fuzzy points and study its effect on the relationship...

Journal: :CoRR 2015
Olivier Marchal

This short note is the result of a French " Hippocampe internship " 2 that aims at introducing the world of research to young undergraduate French students. The problem studied is the following: imagine yourself locked in a cage barred with n different locks. You are given a keyring with N ≥ n keys containing the n keys that open the locks. In average, how many trials are required to open all l...

Journal: :IFIP advances in information and communication technology 2022

Global navigational satellite systems provide accurate time synchronization and location services. Satellites transmit navigation messages that can be used by a receiver to compute its location. However, most are not protected easily spoofed. Several attacks have been reported spoofed or replayed GPS signals divert hijack autonomous vehicles, ships drones. Unfortunately, non-cryptographic prote...

2011
Philip Marquardt David Dagon Patrick Traynor

Shopper loyalty club programs are advertised as a means of reducing prices for consumers. When making a purchase, a customer simply scans their keyring tag along with the items they intend to buy and is granted a reduction in the total price. While the use of these cards results in a visible reduction in price, customers are largely unaware of the privacy implications of such discounts. In part...

2007
Jun Rekimoto Takashi Miyaki Takaaki Ishizawa

Continuous logging of a person's geographical position is required for various " life-log " applications, such as memory aids, automatic blog generation, and life pattern analysis. GPS is one way of logging, but it is unable to track movements indoors, and hence cannot track people !G s ordinary activities. We propose a WiFi-based location detection technology for location logging. It detects a...

2006
Muthukaruppan Annamalai Andrew Birrell Dennis Fetterly Ted Wobber

We consider the problem of using a wide variety of computers, dispersed geographically and with varied connectivity, while wanting to have each of them provide you with the same, personalized, desktop environment: operating system, customizations, applications and your documents. We describe the existing range of solutions available for this problem, and introduce and characterize the new “Desk...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید