The networking landscape is about to change. The multitude of different kind of operators and access networks can provide access at any time irrespective of location. However, it ...
Abstract. Multi-signatures allow multiple signers to jointly authenticate a message using a single compact signature. Many applications however require the public keys of the signe...
We show how untrusted computers can be used to facilitate secure mobile data access. We discuss a novel architecture, data staging, that improves the performance of distributed ï¬...
Jason Flinn, Shafeeq Sinnamohideen, Niraj Tolia, M...
libtissue is a software system for implementing and testing AIS algorithms on real-world computer security problems. AIS algorithms are implemented as a collection of cells, antig...
In this paper we introduce the idea of integrating high security level services to support law enforcement with high-tech crime investigation. We take advantage of a process-orien...
Cezary Mazurek, Maciej Stroinski, Dariusz Walczak,...