In this paper we describe the design for the Pvault software, which is a personal data manager that stores and retrieves data from a remote untrusted data server securely. The maj...
Ravi Chandra Jammalamadaka, Sharad Mehrotra, Nalin...
If multicast communication appears as the most efficient way to send data to a group of participants, it presents also more vulnerabilities to attacks and requires services such as...
We introduce the notion of key stretching, a mechanism to convert short s-bit keys into longer keys, such that the complexity required to brute-force search a s + t-bit keyspace is...
John Kelsey, Bruce Schneier, Chris Hall, David Wag...
Pervasive devices interacting in open and dynamic spaces with each others require a mechanism that allows them acting autonomously in a secure way and protecting their resources. ...
We argue that designing a system that “guarantees” the privacy of its information may not be enough. One must also consider the price for providing that protection: For exampl...