We define security goals and attack models for disk encryption, and prove several relationships between the resulting security notions, and some general results about disk encryp...
Security patterns capture best practice on secure software design and development. They document typical solutions to security problems. To ensure security, large software system ...
We construct two efficient Identity Based Encryption (IBE) systems that are selective identity secure without the random oracle model. Selective identity secure IBE is a slightly w...
We introduce and describe a novel network simulation tool called NeSSi (Network Security Simulator). NeSSi incorporates a variety of features relevant to network security distingu...