Windows into the Past: Exploiting Legacy Crypto in Modern {OS's} Kerberos Implementation

M Shagam, E Ronen - 33rd USENIX Security Symposium (USENIX …, 2024 - usenix.org
The Kerberos protocol is used by millions of users and network administrators worldwide for
secure authentication, key distribution, and access control management to enterprise …

Deeper insight into why authentication schemes in IoT environments fail to achieve the desired security

Y Guo, Y Guo, P ** Mechanism.
S Jiao, J Meng, Y Zhao, K Cheng - Computer Systems Science …, 2024 - cdn.techscience.cn
Federated learning is a distributed machine learning framework that solves data security
and data island problems faced by artificial intelligence. However, federated learning …

A Differential Privacy Federated Learning Scheme Based on Adaptive Gaussian Noise.

S Jiao, L Cai, X Wang, K Cheng… - … -Computer Modeling in …, 2024 - search.ebscohost.com
As a distributed machine learning method, federated learning (FL) has the advantage of
naturally protecting data privacy. It keeps data locally and trains local models through local …

Dancing with Fischer, Lynch & Paterson's impossibility result

HN Mathisen - 2024 - skemman.is
This thesis presents Mimir, an asynchronously distributed Single Sign-On (SSO) service that
uses biometric scanners on physical devices to reach states of authorized and …

A Survey on Alerting Using Honeyword System

E Rajkumar, B Aravinthan, V Muthiah… - … -Gen Technologies in …, 2024 - taylorfrancis.com
A security method called Honeywords is used to identify and stop website password
assaults. This method involves including honeywords, or fictitious passwords, along with …