In countries such as China or Iran where Internet censorship is prevalent, users usually rely on proxies or anonymizers to freely access the web. The obvious difficulty with this a...
The challenge for user authentication in a global file system is allowing people to grant access to specific users and groups in remote administrative domains, without assuming ...
Michael Kaminsky, George Savvides, David Mazi&egra...
Security must be a first class citizen in the design of large scale, interacting, software applications, at early and all stages of the lifecycle, for accurate and precise policy ...
Thuong Doan, Steven A. Demurjian, T. C. Ting, Andr...
We propose minimalist new hardware additions to a microprocessor chip that protect cryptographic keys in portable computing devices which are used in the field but owned by a cen...
Abstract. We present schemes for providing anonymous transactions while privacy and anonymity are preserved, providing user anonymous authentication in distributed networks such as...