Steganography is used to hide the occurrence of communication. Recent suggestions in US newspapers indicate that terrorists use steganography to communicate in secret with their a...
TPM is able to provide strong secure storage for sensitive data such as passwords. Although several commercial password managers have used TPM to cache passwords, they are not cap...
— Due to the technological evolution, context-aware computing is slowly moving from dream to reality. These applications heavily rely in sensing the user’s environment and ing ...
The object model is a very popular paradigm for building distributed applications. Several standardisation efforts are underway that define architectures for distributed computing...
The security-mediated approach to PKI offers several advantages, such as instant revocation and compatibility with standard RSA tools. In this paper, we present a design and protot...