The protocol design for wireless roaming authentication is challenging because of the key management regarding users and home/visited networks. In this paper, we present two authe...
There is a natural intuitive match between anonymity and information theory. In particular, the maximal anonymity loss in anonymity protocols can be matched to the information the...
Covert channels are used for the secret transfer of information. Encryption only protects communication from being decoded by unauthorised parties, whereas covert channels aim to ...
Sebastian Zander, Grenville J. Armitage, Philip Br...
The Escrowed Encryption Standard (EES) defines a US Government family of cryptographic processors, popularly known as "Clipper" chips, intended to protect unclassified g...
Machines for Communication Security Pierre Bieber, Nora Boulahia-Cuppens Thomas Lehmann, Erich van Wickeren ONERA-CERT CAP debis GEI 2 Av. E. Belin Oxfordstr. 12-16 F-31055, Toulou...
Pierre Bieber, Nora Boulahia-Cuppens, T. Lehmann, ...