Abstract. We develop a language-based approach for modeling and verifying aspects of privacy policies. Our approach relies on information-flow control. Concretely, we use the prog...
Abstract—In this work we consider two protocols for performing cryptanalysis and security enhancement. The first one by Song, is a password authentication scheme based on smart ...
: Container security systems including electronic seals play an important role in securing container logistics. Nevertheless, a lack of standards prevents devices by different vend...
In collaborative applications, participants agree on certain level of secure communication based on communication policy specifications. Given secure communication policy speci...
Srilaxmi Malladi, Sushil K. Prasad, Shamkant B. Na...
Abstract. Problems of secure communication and computation have been studied extensively in network models, for example, Franklin and Yung have studied secure communications in the...