The standard solution for mutual authentication between human users and servers on the Internet is to execute a TLS handshake during which the server authenticates using a X.509 ce...
With Hidden Credentials Alice can send policyencrypted data to Bob in such a way that he can decrypt the data only with the right combination of credentials. Alice gains no knowle...
In this paper we present Trishul-UCON (T-UCON), a DRM system based on the UCONABC model. T-UCON is designed to be capable of enforcing not only application-specific policies, as a...
Srijith Krishnan Nair, Andrew S. Tanenbaum, Gabrie...
To ensure fair and secure communication in Mobile Ad hoc Networks (MANETs), the applications running in these networks must be regulated by proper communication policies. However,...
With the ubiquitous deployment of large scale networks more and more complex human interactions are supported by computer applications. This poses new challenges on the expressive...