Abstract—We present the design and experimental evaluation of Simultaneous TRansmission with Orthogonally Blinded Eavesdroppers (STROBE). STROBE is a cross-layer approach that ex...
We present an authorization logic that permits reasoning with explicit time. Following a proof-theoretic approach, we study the meta-theory of the logic, including cut elimination...
Privacy is extremely important in healthcare systems. Unfortunately, most of the solutions already deployed are developed empirically. After discussing some of such existing solut...
The trend towards value-added Internet services causes network providers to deploy new network based quality-of-service and security services. Today, however, the customer has onl...
Abstract. Common software-protection systems attempt to detect malicious observation and modification of protected applications. Upon tamper detection, anti-hacking code may produ...
Mariusz H. Jakubowski, Chit Wei Saw, Ramarathnam V...