Using smart cards, remote user authentication and key agreement can be simplified, flexible, and efficient for creating a secure distributed computers environment. Addition to use...
A novel strategy for the representation and manipulation of distributed documents, potentially complex and heterogeneous, is presented in this paper. The document under the propos...
This article proposes a simple key management protocol for the distribution of shared session keys in IEEE 802.11 wireless LANs. For this purpose an individual key for each user i...
This paper describes a security architecture designed to support role-based access control for distributed object systems in a large-scale, multi-organisational enterprise in whic...
—We present a metaheuristic-based attack against the traceability of an ultra-lightweight authentication protocol for RFID environments called SLMAP, and analyse its implications...
Julio C. Hernandez-Castro, Juan E. Tapiador, Pedro...