We promote an engineering approach to design of provably secure key exchange protocols. Using the model of Canetti and Krawczyk we present a systematic method to arrive at efficie...
Yiu Shing Terry Tin, Colin Boyd, Juanma Gonz&aacut...
Assuring information authenticity is an important issue in the field of information security. A new broadcast authentication protocol is proposed. The protocol is based on time sy...
MaxMash is a tool that can compose select features of networked application and generate the source code for application mashups that can integrate those features. This paper pres...
This paper introduces a peer-to-peer agent framework for supporting autonomic applications in decentralized distributed environments. The framework provides agents to discover, co...
Most protocols for distributed, fault-tolerant computation, or multi-party computation (MPC), provide security guarantees in an all-or-nothing fashion: If the number of corrupted p...