— Despite the popularity of VoIP these days, this method of communication may present significant security challenges in terms of privacy and accounting. Authentication and messa...
This paper continues the program initiated in [5], towards a derivation system for security protocols. The general idea is that complex protocols can be formally derived, starting...
Anupam Datta, Ante Derek, John C. Mitchell, Dusko ...
Abstract. Atomicity Decomposition is a technique in the Event-B formal method, which augments Event-B refinement with additional structuring in a diagrammatic notation to support c...
Currently, many privacy-preserving data mining (PPDM) algorithms assume the semi-honest model and/or malicious model of multi-party interaction. However, both models are far from ...
Intelligent security protocols can verify whether the involved principals have properties that are defined based on certain functional and security policies. The property we focu...