This paper presents a new password authentication and key-exchange protocol suitable for authenticating users and exchanging keys over an untrusted network. The new protocol resis...
Motivated by the study of algorithmic problems in the domain of information security, in this paper, we study the complexity of a new class of computations over a collection of va...
Fingerprint indexing is an efficient technique that greatly improves the performance of fingerprint based person authentication systems by reducing the number of comparison. In th...
Secure group communication with hierarchical access control refers to a scenario where a group of members is divided into a number of subgroups located at different privilege leve...
This paper presents the first type system for statically analyzing security protocols that are based on zero-knowledge proofs. We show how several properties offered by zero-knowl...