We develop a compositional method for proving cryptographically sound security properties of key exchange protocols, based on a symbolic logic that is interpreted over conventiona...
Anupam Datta, Ante Derek, John C. Mitchell, Bogdan...
A secure logging mechanism named haplog is proposed. In essence, haplog uses only one-way hash functions to achieve the security and functional requirements of logging. This makes...
Data integration has been a long standing challenge to the database and data mining communities. This need has become critical in numerous contexts, including building e-commerce ...
Sourav S. Bhowmick, Le Gruenwald, Mizuho Iwaihara,...
Recently we showed how to justify a Dolev-Yao type model of cryptography as used in virtually all automated protocol provers under active attacks and in arbitrary protocol environ...
A Distributed Information Brokering System (DIBS) is a peer-to-peer overlay network that comprises diverse data servers and brokering components helping client queries locate the ...
Fengjun Li, Bo Luo, Peng Liu, Dongwon Lee, Chao-Hs...