This paper presents a low-cost and secure authentication protocol to reduce the computational load on both the back-end database and the tags in a distributed RFID system. The prop...
JaeCheol Ha, Hwankoo Kim, JeaHoon Park, Sang-Jae M...
We prove a tight lower bound for generic protocols for secure multicast key distribution where the messages sent by the group manager for rekeying the group are obtained by arbitra...
This paper considers a coalition C of enterprises {E1,..., En}, which is to be governed by a coalition policy PC , and where each memberenterprise Ei has its own internal policy Pi...
Traditionally, the telecom industry has used clusters to meet its carrier-class requirements of high availability, reliability, and scalability, while relying on cost-effective ha...
Makan Pourzandi, Ibrahim Haddad, Charles Levert, M...
In this position paper we investigate the security of cyberphysical systems. We (1) identify and define the problem of secure control, (2) investigate the defenses that informati...