Security is an important concern in providing the infrastructure for the implementation of general purpose computational grids. However, most grid implementations focus their secu...
Nodes in a mobile ad hoc network need to thwart various attacks and malicious activities. This is especially true for the ad hoc environment where there is a total lack of central...
A notion of open bisimulation is proposed for the Applied Pi Calculus, which extends -calculus in order to facilitate analyzing security protocols. Our notion is based on the label...
The lack of trust amongst consumers and concerns about disclosing personal information are commonly seen as a major impediment to the growth of e-commerce. This is a consequence o...
Block ciphers are usually based on one top-level scheme into which we plug “round functions”. To analyze security, it is important to study the intrinsic security provided by t...