A new identity-based key agreement protocol designed to operate on thenetworklayerispresented. Endpoint addresses, namelyIP and MAC addresses, areusedaspublickeystoauthenticatethe ...
Christian Schridde, Matthew Smith, Bernd Freislebe...
Distributed proof construction protocols have been shown to be valuable for reasoning about authorization decisions in open distributed environments such as pervasive computing sp...
Abstract. We study large-scale distributed cooperative systems that use optimistic replication. We represent a system as a graph of actions (operations) connected by edges that rei...
Abstract Traditionally, research in secure group key agreement focuses on minimizing the computational overhead for cryptographic operations, and minimizing the communication overh...
The model of overloading views is a facility allowing the programmer to separate some kinds of crosscutting concerns that occur during design, implementation and maintenance of dat...