Recent secure code-update protocols for sensor networks have been based on asymmetric-crypto primitives such as digital signatures. Our approach, Castor, explores the feasibility ...
In this paper, we propose a new model for securing agent-based systems in which agents are equipped with reasoning capabilities allowing them to interact with each other. The agen...
Jamal Bentahar, John-Jules Ch. Meyer, Bernard Moul...
Although many charities have a web presence, almost all of them have been designed to accept credit cards as the only means for making donations. The anonymity requirements of many...
Abstract. This paper describes e cient protocols for multi-party computations that are information-theoretically secure against passive attacks. The results presented here apply to...
Various researches have proposed multiple protocols within 802.11 security to protect and authenticate access to wireless LAN. This paper presents the first implementation of EAP-...