We study a security property for processes in dynamic contexts, i.e., contexts that can be reconfigured at runtime. The security property that we propose in this paper, named Per...
We investigate the composition of protocols that share a common secret. This situation arises when users employ the same password on different services. More precisely we study w...
—Biometric authentication is emerging as the promising solution to conventional cryptography based authentication technologies. However, protecting users’ biometric templates s...
Through their misuse of authorized privileges, insiders have caused great damage and loss to corporate internal information assets, especially within the Intelligence Community (IC...
We develop an abstract framework that encompasses the key properties of bilinear groups of composite order that are required to construct secure pairing-based cryptosystems, and we...