With the Web 2.0 trend and its participation of end-users more and more data and information services are online accessible, such as web sites, Wikis, or web services. The integra...
We demonstrate that symmetric-key cryptography can be used for both read and write access control. One-time write access can be granted by handing over an encryption key, and our ...
The purpose of this work is to experimentally evaluate the quality of voice and data services over community-based WLAN access networks. We use P2PWNC, the Wireless LAN roaming ar...
Pantelis A. Frangoudis, Vasileios P. Kemerlis, Dim...
We introduce and analyze a randomized traitor tracing algorithm for broadcast security. This algorithm is very efficient compared to brute force methods (the mean time it takes is...
Abstract—New modes of communication have shown themselves to be needed for more secure and private types of data. Steganography or data-hiding through covert channels can be high...