About fifteen years ago, I wrote a paper on security problems in the TCP/IP protocol suite, In particular, I focused on protocol-level issues, rather than implementation flaws. It...
The need for delegating information arises when the data owner wants to have her data handled by an external party. If the external party is untrusted and data are confidential, d...
Josep Domingo-Ferrer, Ricardo X. Sanchez del Casti...
The correct implementation of security protocols is a challenging task. To achieve a high degree of confidence in an implementation, as with any software, ideally one requires bot...
In an optimistic approach to security, one can often simplify protocol design by relying on audit logs, which can be analyzed a posteriori. Such auditing is widely used in practice...
Abstract. In this paper, we show through a simple secure symmetric key based protocol design and its implementation the feasibility of secure data collection in a vehicular sensor ...
Harry Gao, Seth Utecht, Fengyuan Xu, Haodong Wang,...