The limited flexibility of the Internet to support mobility has motivated many researchers to look for alternative architectures. One such effort that combines security and multi...
Hannes Tschofenig, Andrei Gurtov, Jukka Ylitalo, A...
We describe a protocol design process, and illustrate its use by creating ATSPECT, an Authentication Test-based Secure Protocol for Electronic Commerce Transactions. The design pr...
We consider a collection of related multiparty computation protocols that provide core operations for secure integer and fixed-point computation. The higher-level protocols offer...
Abstract. The application area of security protocols raises several problems that are relevant to automated deduction. We describe in this note some of these challenges.