Computer users express a strong desire to prevent attacks and to reduce the losses from computer and information security breaches. However, security compromises are common and wi...
: The use of agent paradigm in today’s applications is hampered by the security concerns of agents and hosts alike. The agents require the presence of a secure and trusted execut...
Abstract. We provide identi£cation protocols that are secure even when the adversary can reset the internal state and/or randomization source of the user identifying itself, and w...
Mihir Bellare, Marc Fischlin, Shafi Goldwasser, Si...
We describe the formal models of two standards related to airport security: one at the international level and the other at the European level. These models are expressed using the...
Mental simulation is proposed by cognitive psychologists as a candidate to model the human reasoning process. In this paper, we propose a methodology that models mental simulation...