Ubic: Bridging the gap between digital cryptography and the physical world

@inproceedings{Simkin2014UbicBT,
  title={Ubic: Bridging the gap between digital cryptography and the physical world},
  author={M. Simkin and Andreas Bulling and M. Fritz and D. Schr{\"o}der},
  booktitle={ESORICS},
  year={2014}
}
  • M. Simkin, Andreas Bulling, +1 author D. Schröder
  • Published in ESORICS 2014
  • Computer Science
  • Advances in computing technology increasingly blur the boundary between the digital domain and the physical world. Although the research community has developed a large number of cryptographic primitives and has demonstrated their usability in all-digital communication, many of them have not yet made their way into the real world due to usability aspects. We aim to make another step towards a tighter integration of digital cryptography into real world interactions. We describe Ubic, a framework… CONTINUE READING
    8 Citations
    Visual Cryptography and Obfuscation: A Use-Case for Decrypting and Deobfuscating Information Using Augmented Reality
    • 9
    • PDF
    Security and Privacy Approaches in Mixed Reality
    • 13
    • PDF
    Analyzing the Use of Quick Response Codes in the Wild
    • 14
    • PDF
    Eyewear computers for human-computer interaction
    • 21
    • PDF

    References

    SHOWING 1-10 OF 47 REFERENCES
    Secure device pairing based on a visual channel
    • 207
    • PDF
    jPBC: Java pairing based cryptography
    • A. D. Caro, V. Iovino
    • Computer Science
    • 2011 IEEE Symposium on Computers and Communications (ISCC)
    • 2011
    • 329
    QR-TAN: Secure Mobile Transaction Authentication
    • 80
    • PDF
    Tiqr: A Novel Take on Two-Factor Authentication
    • 19
    • PDF
    Non-malleable cryptography
    • 1,031
    Converting Pairing-Based Cryptosystems from Composite-Order Groups to Prime-Order Groups
    • D. Freeman
    • Mathematics, Computer Science
    • EUROCRYPT
    • 2010
    • 266
    • PDF
    Seeing-is-believing: using camera phones for human-verifiable authentication
    • 515
    • PDF
    A Scanner Darkly: Protecting User Privacy from Perceptual Applications
    • 110
    • PDF