Browsing Mathematics (Faculty of) by Subject "authentication"
Now showing items 1-5 of 5
-
Adaptive User Authentication on Mobile Devices
(University of Waterloo, 2022-07-19)Modern mobile devices allow users to access various applications and services anywhere. However, high mobility also exposes mobile devices to device loss, unauthorized access, and many other risks. Existing studies have ... -
Desired Features and Design Methodologies of Secure Authenticated Key Exchange Protocols in the Public-Key Infrastructure Setting
(University of Waterloo, 2004)The importance of an authenticated key exchange (AKE) protocol has long been known in the field of cryptography. Two of the questions still being asked today are (1) what properties or features does a secure AKE ... -
A Machine Learning Approach for RDP-based Lateral Movement Detection
(University of Waterloo, 2019-09-19)Detecting cyber threats has been an on-going research endeavor. In this era, advanced persistent threats (APTs) can incur significant costs for organizations and businesses. The ultimate goal of cybersecurity is to thwart ... -
Nymbler: Privacy-enhanced Protection from Abuses of Anonymity
(University of Waterloo, 2011-01-05)Anonymous communications networks help to solve the real and important problem of enabling users to communicate privately over the Internet. However, by doing so, they also introduce an entirely new problem: How can service ... -
Post-Quantum Account Recovery for Passwordless Authentication
(University of Waterloo, 2023-04-24)WebAuthn is a passwordless authentication protocol which allows users to authenticate to online services using public-key cryptography. Users prove their identity based on possession of a private key, which is stored on a ...