— This paper analyzes the performance of a system architecture for the Authentication, Authorization, and Accounting (AAA), in a scenario where 3G users generate traffic and invo...
— Despite the popularity of VoIP these days, this method of communication may present significant security challenges in terms of privacy and accounting. Authentication and messa...
Abstract. This paper presents a design-space exploration of the Galois/Counter Mode (GCM) algorithm with Advanced Encryption Standard (AES) as underlying block cipher for high thro...
Stefan Lemsitzer, Johannes Wolkerstorfer, Norbert ...
The distribution of the wavelet coefficients in 2-D discrete wavelet transform (DWT) subspaces can be well described by a Gaussian mixture statistical model. In this paper, a secr...
Online email archives are an under-protected yet extremely sensitive information resource. Email archives can store years worth of personal and business email in an easy-to-access...