We analyze the security of elastic block ciphers against key-recovery attacks. An elastic version of a fixed-length block cipher is a variable-length block cipher that supports an...
Many software security solutions require accurate tracking of control/data dependencies among information objects in network applications. This paper presents a general dynamic in...
We developed gSET as solution for the unsolved problems in the field of dynamic trust management and secure accounting in commercial virtual organizations. gSET establishes trust...
A mobile ad hoc network (MANET) is formed by a group of mobile wireless nodes, each of which functions as a router and agrees to forward packets for others. Many routing protocols ...
Automated processing of facial images has become a serious market for both hard- and software products. For the commercial success of face recognition systems it is most crucial th...