Secure group communication protocols, in particular multi-party key agreement and update algorithms, help promote traditional and new Internet multi-party applications such as vid...
The class lectures for this class are broadcast live on the internet. Video recordings of all classes are available on-line. The presrntation cover the following topics:
A Review...
For hardware security applications, the availability of secret keys is a critical component for secure activation, IC authentication and for other important applications including...
The paper discusses XML security key technologies related with security of Web service. Based on these discussions, Web service is integrated with some mature security architecture...
Cryptographic algorithms play a key role in computer security and the formal analysis of their robustness is of utmost importance. Yet, logic and automated reasoning tools are seld...