We study proactive two-party signature schemes in the context of user authentication. A proactive two-party signature scheme (P2SS) allows two partiesāthe client and the serverā...
Antonio Nicolosi, Maxwell N. Krohn, Yevgeniy Dodis...
Business Processes for Web Services are the new paradigm for the lightweight integration of business from diļ¬erent enterprises. Whereas the security and access control policies ...
The combination of username and password is widely used as a human authentication mechanism on the Web. Despite this universal adoption and despite their long tradition, password s...
ions for Network Update Mark Reitblatt Cornell Nate Foster Cornell Jennifer Rexford Princeton Cole Schlesinger Princeton David Walker Princeton Conļ¬guration changes are a common...
Mark Reitblatt, Nate Foster, Jennifer Rexford, Col...
Law enforcement agencies need the ability to conduct electronic surveillance to combat crime, terrorism, or other malicious activities exploiting the Internet. However, the prolif...
Wei Yu, Xinwen Fu, Steve Graham, Dong Xuan, Wei Zh...