Abstract. There are many settings in which sensitive information is made available to a system or organisation for a specific purpose, on the understanding that it will be erased o...
For successful software verification, model checkers must be capable of handling a large number of program variables. Traditional, BDD-based model checking is deficient in this re...
This paper contains a set of personal views relating to NHS Connecting for Health’s National Programme for IT (NPfIT), and in particular its Care Records Service, written from t...
Wireless networks are being integrated into the modern automobile. The security and privacy implications of such in-car networks, however, are not well understood as their transmi...
Ishtiaq Rouf, Rob Miller, Hossen Mustafa, Travis T...