Aug. 9, 2022, 1:20 a.m. | V Mora-Afonso, Pino Caballero-Gil, Jezabel Molina-Gil

cs.CR updates on arXiv.org arxiv.org

The rapid deployment of wireless technologies has given rise to the current
situation where mobile phones and other wireless devices have become essential
elements in all types of activities, including in the home. In particular,
smartphones and laptops are used for wirelessly sharing photos and documents,
playing games, browsing websites, and viewing multimedia, for example. This
work describes a proposal for both desktop and mobile applications that use
Identity-Based Cryptography (IBC) to protect communications between smart
wireless devices in the …

authentication devices smart strong authentication wireless

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Information Security Engineers

@ D. E. Shaw Research | New York City

Staff DFIR Investigator

@ SentinelOne | United States - Remote

Senior Consultant.e (H/F) - Product & Industrial Cybersecurity

@ Wavestone | Puteaux, France

Information Security Analyst

@ StarCompliance | York, United Kingdom, Hybrid

Senior Cyber Security Analyst (IAM)

@ New York Power Authority | White Plains, US