نتایج جستجو برای: keychain
تعداد نتایج: 35 فیلتر نتایج به سال:
The paper highlights risks that accompany losing a locked iOS device regarding confidentiality of passwords stored in the keychain. It presents results of handson tests that show the possibility for attackers to reveal some of the keychain entries. For the described approach, the knowledge of the user’s secret passcode is not needed, as the protection provided by the passcode is bypassed.
This paper summarizes answers to frequently asked questions about the iOS keychain weakness described in [HB11]. It provides further information for security evaluators on the impact of the findings.
A natural equivalence relation on the set of all fuzzy subsets, generalizing the equality of crisp sets, was recently introduced and studied in various contexts such as finite fuzzy subsets, fuzzy vector space, finite fuzzy subfields and in the classification of finite Abelian groups. In this paper, we restrict this equivalence to the set of fuzzy points and study its effect on the relationship...
This short note is the result of a French " Hippocampe internship " 2 that aims at introducing the world of research to young undergraduate French students. The problem studied is the following: imagine yourself locked in a cage barred with n different locks. You are given a keyring with N ≥ n keys containing the n keys that open the locks. In average, how many trials are required to open all l...
Global navigational satellite systems provide accurate time synchronization and location services. Satellites transmit navigation messages that can be used by a receiver to compute its location. However, most are not protected easily spoofed. Several attacks have been reported spoofed or replayed GPS signals divert hijack autonomous vehicles, ships drones. Unfortunately, non-cryptographic prote...
Shopper loyalty club programs are advertised as a means of reducing prices for consumers. When making a purchase, a customer simply scans their keyring tag along with the items they intend to buy and is granted a reduction in the total price. While the use of these cards results in a visible reduction in price, customers are largely unaware of the privacy implications of such discounts. In part...
Continuous logging of a person's geographical position is required for various " life-log " applications, such as memory aids, automatic blog generation, and life pattern analysis. GPS is one way of logging, but it is unable to track movements indoors, and hence cannot track people !G s ordinary activities. We propose a WiFi-based location detection technology for location logging. It detects a...
We consider the problem of using a wide variety of computers, dispersed geographically and with varied connectivity, while wanting to have each of them provide you with the same, personalized, desktop environment: operating system, customizations, applications and your documents. We describe the existing range of solutions available for this problem, and introduce and characterize the new “Desk...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید