—Buyer-seller watermarking protocols incorporates digital watermarking with cryptography, in order to protect digital copyrights and privacy rights for the seller and the buyer b...
The use of one-way chains in authentication protocols is a technique of great importance which has many applications. Employing cryptographic techniques in the area of industrial ...
The Exponential Challenge Response (XRC) and Dual Exponential Challenge Response (DCR) signature schemes are the building blocks of the HMQV protocol. We propose a complementary an...
Augustin P. Sarr, Philippe Elbaz-Vincent, Jean-Cla...
We present a process algebraic intruder model for verifying a class of liveness properties of security protocols. For this class, the proposed intruder model is proved to be equiv...
The World Wide Web is playing a major role in reducing business costs and in providing convenience to users. Digital Libraries capitalize on this technology to distribute document...