In this research article we discuss the protocols, architecture and propose the design of Network Domain Security (NDS) model for IP Multimedia Subsystem (IMS). The IMS is standard...
This paper describes an extension of the Java language that provides “programmable security.” The approach augments the Java syntax with constructs for specifying various acce...
John Hale, Mauricio Papa, Oliver Bremer, Rodrigo C...
We consider one-round key exchange protocols secure in the standard model. The security analysis uses the powerful security model of Canetti and Krawczyk and a natural extension of...
Abstract. Radio Frequency Identification (RFID) systems are vulnerable to relay attacks (i.e., mafia, terrorist and distance frauds) when they are used for authentication purpose...
We show how to design secure authentication protocols for a non-standard class of scenarios. In these authentication is not bootstrapped from a PKI, shared secrets or trusted thir...