Abstract. The security requirements of complex multi-tier web applications have shifted from simple localized needs, such as authentication or authorization, to physically distribu...
Abstract. In this paper we present a real-world hardware-assisted attack on the wellknown A5/1 stream cipher which is (still) used to secure GSM communication in most countries all...
Our group is involved in the European funded Webocracy project in which an e-government system called Webocrat has been designed and implemented. Our responsibility is to provide m...
We present a metamodel for runtime architecture and demonstrate with experimental results how this metamodel can be used to recover, analyze and improve runtime architecture of mo...
In this paper we present a software architecture and a development environment for the implementation of applications based on secure mobile agents. Recent breakthroughs in mobile...
Carles Garrigues, Sergi Robles, Joan Borrell, Guil...