Whether a particular computing installation meets its security goals depends on whether the administrators can create a policy that expresses these goals—security in practice re...
Sergey Bratus, Alex Ferguson, Doug McIlroy, Sean W...
The Transmission Control Protocol Internet Protocol TCP IP 1 suite is a very widely used technique that is employed to interconnect computing facilities in modern network environm...
Secure multi-party computation (MPC) is a central problem in cryptography. Unfortunately, it is well known that MPC is possible if and only if the underlying communication network...
Computer science is necessary but not sufficient to understand and overcome the problems we face in software engineering. We need to understand not only the properties of the soft...
Abstract. We present a Mobile-Ambients-based process calculus to describe context-aware computing in an infrastructure-based Ubiquitous Computing setting. In our calculus, computin...