Software for encrypting email messages has been widely available for more than 15 years, but the emailusing public has failed to adopt secure messaging. This failure can be explai...
The networking landscape is about to change. The multitude of different kind of operators and access networks can provide access at any time irrespective of location. However, it ...
Designers of cryptographic systems are at a disadvantage to most other engineers, in that information on how their systems fail is hard to get: their major users have traditionall...
We introduce HAIL (High-Availability and Integrity Layer), a distributed cryptographic system that allows a set of servers to prove to a client that a stored file is intact and r...
Important properties of many protocols are liveness or availability, i.e., that something good happens now and then. In asynchronous scenarios these properties obviously depend on...
Michael Backes, Birgit Pfitzmann, Michael Steiner,...