We present the first cryptographically sound security proof of the well-known Otway-Rees protocol. More precisely, we show that the protocol is secure against arbitrary active att...
This paper examines the suitability and use of runtime verification as means for monitoring security protocols and their properties. In particular, we employ the runtime verificat...
This study focuses on exploring Internet literacy and social awareness as antecedents to Internet users’ attitudes towards government surveillance in the Internet environment. P...
Through legislation and technology the film industry has been seeking to fully control usage of the bits it creates; their model is "restrictive" digital-rights manageme...
Secure group communication protocols have been designed to meet needs such as secure management of group membership, confidential group communication, and access control. New lan...