Unique and challenging security problems arise due to the scarcity of computational, storage, and power resources in the low-cost pervasive computing environment. Particularly rel...
The elements of multimodal authentication along with system models are presented. These include the machine experts as well as machine supervisors. In particular fingerprint and s...
In this paper we compare different authentication techniques that may be used in order to reduce the time and resources required to perform a handover: namely, re-authentication a...
Antonio Izquierdo, Nada Golmie, Katrin Hoeper, Lid...
We present an analysis of security vulnerabilities in the Domain Name System (DNS) and the DNS Security Extensions (DNSSEC). DNS data that is provided by name servers lacks suppor...
By functionally decomposing a specific algorithm (the hierarchical secure aggregation algorithm of Chan et al. [3] and Frikken et al. [7]), we uncover a useful general functionali...