The Trusted Platform Module (TPM) is a hardware chip designed to enable computers to achieve a greater level of security than is possible in software alone. To this end, the TPM pr...
Internet security is of utmost importance in today's e-commerce environment. Many different avenues are being taken in an attempt to secure the systems of both the end user a...
Security is not an isolated good, but just one component of a complicated economy. That imposes limitations on how effective it can be. The interactions of human society and human...
A type flaw attack on a security protocol is an attack where a field that was originally intended to have one type is subsequently interpreted as having another type. A number o...
In this paper we describe new secure personalization schemes using proxy cryptography. We first introduce the context of a large scale smart card application such as an electronic ...