Certificate management infrastructure, a.k.a. PKI (Public Key Infrastructure), which issues and provides access to public key certificates to preserve the integrity of a public ke...
We examine some known attacks on the PIN verification framework, based on weaknesses of the security API for the tamperresistant Hardware Security Modules used in the network. We s...
Matteo Centenaro, Riccardo Focardi, Flaminia L. Lu...
Abstract. Web services are deemed as the natural choice for deploying e-government applications. Their use enables e-government to fully get advantage of the envisioned Semantic We...
In trust negotiation and other distributed proving systems, networked entities cooperate to form proofs that are justified by collections of certified attributes. These attributes...
Abstract. In this paper we examine an emerging class of systems that link People-to-People-toGeographical-Places; we call these P3-Systems. Through analyzing the literature, we hav...
Quentin Jones, Sukeshini A. Grandhi, Loren G. Terv...