Remote attestation is the process of verifying internal state of a remote embedded device. It is an important component of many security protocols and applications. Although previo...
Many cryptographic tasks and protocols, such as non-repudiation, contract-signing, voting, auction, identity-based encryption, and certain forms of secure multi-party computation,...
The protection of privacy is an increasing concern in our networked society because of the growing amount of personal information that is being collected by a number of commercial...
Claudio Agostino Ardagna, Marco Cremonini, Sabrina...
Access control mechanisms are commonly used to provide control over who may access sensitive information. However, malicious users can exploit the correlation among the data and in...
: Ambient Intelligence scenarios describe situations in which multitude of devices and agents live together. In this kind ofscenarios is frequent to see the appearance ofconflicts ...