The Java Cryptography Architecture, JCA in short, was created to allow JCA-compliant cryptography providers to be plugged into a JCA-aware application at run time. This configurab...
Intrusion detection, as a complementary mechanism to intrusion prevention, is necessary to secure wireless Mobile Ad hoc Networks (MANETs). In this paper we propose a practical age...
Hongmei Deng, Roger Xu, Frank Zhang, Chiman Kwan, ...
One of the concerns patients have when confronted with a medical condition is which physician to trust. Any recommendation system that seeks to answer this question must ensure an...
We have designed and implemented a general and powerful distributed authentication framework based on higher-order logic. Authentication frameworks — including Taos, SPKI, SDSI,...
Designing a secure and dependable system is not just a technical issue, it involves also a deep analysis of the organizational and the social environment in which the system will ...
Yudistira Asnar, Paolo Giorgini, Roberto Bonato, V...