We analyze the Extended Access Control (EAC) protocol for authenticated key agreement, recently proposed by the German Federal Office for Information Security (BSI) for the deploym...
—Social network information is now being used in ways for which it may have not been originally intended. In particular, increased use of smartphones capable of running applicati...
Abstract. This paper describesa method for establishing ad hoc and infrastructuremode wireless network connections based on physical proximity. Users can easily establish secure wi...
Although Instant Messaging (IM) services are now relatively long-standing and very popular as an instant way of communication over the Internet, they have received little attention...
State based protocols are protocols in which the handling of one message depends on the contents of previous messages. Testing such protocols, for security or for other purposes u...