Abstract. Software flaws in applications such as a browser may be exploited by attackers to launch drive-by-download (DBD), which has become the major vector of malware infection....
In this paper, we analyze the cyber security of state estimators in Supervisory Control and Data Acquisition (SCADA) systems operating in power grids. Safe and reliable operation o...
The XML Key Management Specification (XKMS) is described. XKMS is a Web Service that provides an interface between an XML application and a Public Key Infrastructure (PKI). XKMS g...
Digital Libraries maintain information lifecycles for the digital objects contained therein. Typically these information lifecycles stipulate that a digital object is deleted at t...
The recent and massive deployment of Voice over IP infrastructures had raised the importance of the VoIP security and more precisely of the underlying signalisation protocol SIP. ...