In this paper the security of "golden" cryptography, which has been proposed recently, is tackled. Specifically, it is shown that the security of such cryptosystem is tr...
We present tools to support model-based security engineering on both the model and the code level. In the approach supported by these tools, one firstly specifies the securitycr...
: Conference Key Management (CKM) is one of the primary issues in Secure Dynamic Conferencing (SDC). In this paper, we propose a novel CKM scheme for SDC based on the
An overview of the activities of the UNESCO Chair in Data Privacy is first given. One of these activities is research. We focus on the research conducted to conciliate security an...
Two implementations are given for Java’s stack-inspection accesscontrol policy. Each implementation is obtained by generating an inlined reference monitor (IRM) for a different...