Abstract. Usage and exploitation of the Internet is a critical requirement for managing and distributing valuable digital assets. This requirement introduces a great number of thre...
Ioannis Chatzigiannakis, Vasiliki Liagkou, D. Salo...
Delivery of products bought online can violate consumers’ privacy, although not in a straightforward way. In particular, delivery companies that have contracted with a website kn...
—People enjoy the convenience of on-line services, but online environments may bring many risks. In this paper, we discuss how to prevent users’ passwords from being stolen by ...
Ming Lei, Yang Xiao, Susan V. Vrbsky, Chung-Chih L...
Designing security softwares that evolve as quickly as threats is a truthful challenge. In addition, current software becomes increasingly more complex and difficult to handle ev...
We present a new methodology for proving security of encryption systems using what we call Dual System Encryption. Our techniques result in fully secure Identity-Based Encryption ...