To protect privacy in large systems, users must be able to authenticate against a central server without disclosing their identity to the network. Private identification protocols ...
More and more important data is accumulated inside social networks. Limiting the flow of private information across a social network is very important, and most social networks pr...
Eelectronic device technology has been monopolized by binary system for many years. The circs not only makes it impossible to break through the existing technology bottleneck, but...
With the growing use of wireless networks and mobile devices, we are moving towards an era where spatial and temporal information will be necessary for access control. The use of s...
We propose an approach to support confidentiality for mobile implementations of security-sensitive protocols using Java/JVM. An applet which receives and passes on confidential in...