The Ideal-Cipher Model of a blockcipher is a well-known and widely-used model dating back to Shannon [24] and has seen frequent use in proving the security of various cryptographi...
Abstract. Logics of knowledge have important applications for reasoning about security protocols and multi-agent systems. We extend the semantics for the logic of necessity with lo...
Abstract. We introduce Verifiable Signature Sharing (VCS), a cryptographic primitive for protecting digital signatures. VCS enables the holder of a digitally signed document, who m...
— In this work we present the principles and experimental demonstration of a BB84 Quantum Key Distribution (QKD) one way system using fainted pulses and a Quadrature Phase-Shift-...
Qing Xu 0006, M. B. C. Silva, Jean-Luc Danger, Syl...
Mobile IPv6 is thought to be dominant protocol for providing mobility. In the near future, most portable communication devices will deploy Mobile IPv6 mechanism. Our main concerns...