Making well-founded security investment decisions is hard: several alternatives may need to be considered, the alternatives’ space is often diffuse, and many decision parameters...
Virginia N. L. Franqueira, Siv Hilde Houmb, Maya D...
Private Set Intersection (PSI) protocols allow one party ("client") to compute an intersection of its input set with that of another party ("server"), such tha...
Keystroke typing characteristics is considered as one of the important biometric features that can be used to protect users against malicious attacks. In this paper we propose a s...
Government-endorsed security evaluations, like those performed under the Common Criteria (CC), use established techniques of software quality assurance to try to evaluate product ...
On the evening of 2 November 1988, someone “infected” the Internet with a worm program. That program exploited flaws in utility programs in systems based on BSD-derived versi...