There has been excellent progress on languages for rigorously describing key exchange protocols and techniques for proving that the network security tunnels they establish preserv...
—The efficiency of BitTorrent for file sharing has inspired a number of BitTorrent-based P2P protocols for Videoon-Demand (VoD). It has been shown that these systems are scalab...
Voice over Internet Protocol (VoIP) is a general term for a family of transmission technologies to delivery of voice communications over IP networks such as the Internet or other ...
We propose a system which allows users to monitor how their email addresses are used and how they spread over the Internet. This protects the privacy of the user and can reduce the...
Tagging schemes have been used in security protocols to ensure that the analysis of such protocols can work with messages of bounded length. When the set of nonces is bounded, this...