This paper is devoted to the design and analysis of short undeniable signatures based on a random oracle. Exploiting their online property, we can achieve signatures with a fully s...
: This paper develops a design case format capable of engaging design practitioners and design students in reflective dialog about their user centred design practice. The core idea...
Developments in ubiquitous and pervasive computing herald a future in which computation is embedded into our daily lives. Such a vision raises important questions about how people...
We describe a protocol design process, and illustrate its use by creating ATSPECT, an Authentication Test-based Secure Protocol for Electronic Commerce Transactions. The design pr...
Providing and managing security for large networked systems is difficult because their size and complexity makes manual design and management nearly impossible. Current security m...