In this work we consider specification and compositional verification for interference detection when several aspects are woven together under joint-weaving semantics without re...
Abstract. In this work, we take a closer look at anonymity and robustness in encryption schemes. Roughly speaking, an anonymous encryption scheme hides the identity of the secret-k...
The Internet has emerged as a crucial part of the Global Information Infrastructure. This is not least due to the remarkable longevity and versatility of some of its protocols. Ac...
Graphical password systems based on the recognition of photographs are candidates to alleviate current over-reliance on alphanumeric passwords and PINs. However, despite being bas...