Delay and disruption tolerant networks (DTNs) can bring much-needed networking capabilities to developing countries and rural areas. DTN features such as high node mobility and in...
Adaptive security, while more realistic as an adversarial model, is typically much harder to achieve compared to static security in cryptographic protocol design. Universal composi...
Abstract. For many cryptographic protocols, security relies on the assumption that adversarial entities have limited computational power. This type of security degrades progressive...
Ran Canetti, Ling Cheung, Dilsun Kirli Kaynar, Nan...
Abstract. In this paper, we present the design of gVault, a cryptographic network file system that utilizes the data storage provided by Gmail’s web-based email service. Such a ...
Ravi Chandra Jammalamadaka, Roberto Gamboni, Shara...
d abstract) Prateek Gupta and Vitaly Shmatikov The University of Texas at Austin We present a cryptographically sound formal method for proving correctness of key exchange protoco...