Abstract. This paper addresses the problems appearing in componentbased development of safety-critical systems. We aim at efficient reasoning about safety at system level while add...
The purpose of this paper is to realize an authentication system which satisfies four requirements for security, privacy protection, and usability, that is, impersonation resistanc...
We present a cryptographic framework to achieve access control, privacy of social relations, secrecy of resources, and anonymity of users in social networks. The main idea is to u...
—Preventing adversaries from compiling significant amounts of user data is a major challenge for social network operators. We examine the difficulty of collecting profile and ...
This paper presents a novel technique for authenticating physical documents based on random, naturally occurring imperfections in paper texture. We introduce a new method for meas...
William Clarkson, Tim Weyrich, Adam Finkelstein, N...