Abstract. Face recognition is increasingly deployed as a means to unobtrusively verify the identity of people. The widespread use of biometrics raises important privacy concerns, i...
Zekeriya Erkin, Martin Franz, Jorge Guajardo, Stef...
The need for delegating information arises when the data owner wants to have her data handled by an external party. If the external party is untrusted and data are confidential, d...
Josep Domingo-Ferrer, Ricardo X. Sanchez del Casti...
We develop a compositional method for proving cryptographically sound security properties of key exchange protocols, based on a symbolic logic that is interpreted over conventiona...
Anupam Datta, Ante Derek, John C. Mitchell, Bogdan...
The AVISPA Tool is a push-button tool for the Automated Validation of Internet Security Protocols and Applications. It provides a modular and expressive formal language for specif...
We adapt the Strand Spaces model to reason abstractly about layered security protocols, where an Application Layer protocol ed on top of a secure transport protocol. The model abst...