Ubic: Bridging the gap between digital cryptography and the physical world
@article{Simkin2014UbicBT, title={Ubic: Bridging the gap between digital cryptography and the physical world}, author={M. Simkin and Andreas Bulling and M. Fritz and D. Schr{\"o}der}, journal={ArXiv}, year={2014}, volume={abs/1403.1343} }
Advances in computing technology increasingly blur the boundary between the digital domain and the physical world. Although the research community has developed a large number of cryptographic primitives and has demonstrated their usability in all-digital communication, many of them have not yet made their way into the real world due to usability aspects. We aim to make another step towards a tighter integration of digital cryptography into real world interactions. We describe Ubic, a framework… CONTINUE READING
Figures, Tables, and Topics from this paper
8 Citations
Visual Cryptography and Obfuscation: A Use-Case for Decrypting and Deobfuscating Information Using Augmented Reality
- Computer Science
- Financial Cryptography Workshops
- 2015
- 10
- PDF
SkullConduct: Biometric User Identification on Eyewear Computers Using Bone Conduction Through the Skull
- Computer Science
- CHI
- 2016
- 33
Display Leakage and Transparent Wearable Displays: Investigation of Risk, Root Causes, and Defenses
- Computer Science
- 2015
- 3
- PDF
References
SHOWING 1-10 OF 46 REFERENCES
Secure device pairing based on a visual channel
- Computer Science
- 2006 IEEE Symposium on Security and Privacy (S&P'06)
- 2006
- 208
- PDF
jPBC: Java pairing based cryptography
- Computer Science
- 2011 IEEE Symposium on Computers and Communications (ISCC)
- 2011
- 339
Smartphones as Practical and Secure Location Verification Tokens for Payments
- Computer Science
- NDSS
- 2014
- 66
- PDF
QR-TAN: Secure Mobile Transaction Authentication
- Computer Science
- 2009 International Conference on Availability, Reliability and Security
- 2009
- 80
- PDF
Converting Pairing-Based Cryptosystems from Composite-Order Groups to Prime-Order Groups
- Mathematics, Computer Science
- EUROCRYPT
- 2010
- 267
- PDF
Seeing-is-believing: using camera phones for human-verifiable authentication
- Computer Science
- 2005 IEEE Symposium on Security and Privacy (S&P'05)
- 2005
- 513
- PDF
A Scanner Darkly: Protecting User Privacy from Perceptual Applications
- Computer Science
- 2013 IEEE Symposium on Security and Privacy
- 2013
- 110
- PDF