Low latency anonymous network systems, such as Tor, were considered secure against timing attacks when the threat model does not include a global adversary. In this threat model t...
This paper describes a security model for mobile agent based systems. The model defines the notion of a security-enhanced agent and outlines security management components in agen...
Online privacy is an increasingly important problem, as many services are now offered in a digital form. Privacy (or the lack thereof) is of a special concern in subscriptions to ...
Access control in decentralised collaborative systems present huge challenges especially where many autonomous entities including organisations, humans, software agents from diff...
Oluwafemi Ajayi, Richard O. Sinnott, Anthony Stell
Abstract. Currently knownbasic anonymitytechniques dependon identity verication. If verication of user identities is not possible due to the related management overhead or a gene...