Abstract. We present a discretely timed spi-calculus. A primitive for key compromise allows us to model key compromise attacks, thus going beyond the standard Dolev–Yao attacker ...
Traditional key management techniques, such as public key cryptography or key distribution center (e.g., Kerberos), are often not effective for wireless sensor networks for the se...
For providing mobility services for users through the global Internet, Mobile IP (MIP) has been standardized by IETF. Since conventional MIP has been investigated without the suppo...
Authentication and key distribution protocols that utilize weak secrets (such as passwords and PINs) are traditionally susceptible to guessing attacks whereby an adversary iterate...
Computer security is of growing importance in the increasingly networked computing environment.This work examines the issue of high-performance network security, specifically int...