: This paper examines the Zhou-Gollmann fair non-repudiation protocol as well as its modified version of Kim et al. We describe how these protocols are vulnerable to an attack by a...
Automatic fingerprint authentication is an integral part in many security systems. Because not every person is always suited to that technology, a general purpose security system ...
Secure communication over the Internet becomes an essential requirement for any value-added Internet application. The use of cryptography for secure communication brings out the r...
Avoidance and discovery of security vulnerabilities in information systems requires awareness of typical risks and a good understanding of vulnerabilities and their exploitations....
— Delivering QoS and ensuring security of Web Services (WS) based architecture is critical and constitutes a significant challenge because of its dynamic and unpredictable nature...
Yann Le Blevec, Chirine Ghedira, Djamal Benslimane...