The increasing use of computers to manage everyday business poses problems for workers when they are away from their home environment. There are two key problems: • How can a mo...
The aim of this paper is to provide better support for the development of secure systems. We argue that current development practice suffers from two key problems:
Ivan Flechais, Martina Angela Sasse, Stephen Haile...
Although there is a substantial amount of work on formal requirements for two and three-party key distribution protocols, very little has been done on requirements for group proto...
: Next to authentication, secure key exchange is considered the most critical and complex issue regarding ad-hoc network security. We present a low-cost, (i.e. low hardware-complex...
We describe an implementation of a distributed algorithm to generate a shared RSA key. At the end of the computation, an RSA modulus N = pq is publicly known. All servers involved...