Intrusion-tolerance is the technique of using fault-tolerance to achieve security properties. Assuming that faults, both benign and Byzantine, are unavoidable, the main goal of Int...
The increasing use of email for phishing and unsolicited marketing has reduced the trustworthiness of email as a communication medium. Sender authentication is a known defense aga...
The paradigm of mobile agents offers a powerful and flexible ity to develop distributed applications on a high-level of abstraction. One of the most interesting tasks for mobile ag...
Hartmut Vogler, Marie-Luise Moschgath, Thomas Kunk...