News

In this paper, to overcome the drawbacks of prior approaches for defending against Illegally-Copying (IC) attacks, such as low generality, high cost, and high overhead, we propose a Low-Cost ...
The user creates a JavaScript-enabled bookmark file once and opens this file to generate a QR code every time to use secure servers. The mobile device generates a secret to encrypt his/her credentials ...