We designed a secure key registration system based on the proactive secret-sharing scheme. A user can register important data such as a session key to a distributed system in a (t...
Confidentiality and integrity of bitstreams and authenticated update of FPGA configurations are fundamental to trusted computing on reconfigurable technology. In this paper, we pr...
David Champagne, Reouven Elbaz, Catherine H. Gebot...
Recent secure code-update protocols for sensor networks have been based on asymmetric-crypto primitives such as digital signatures. Our approach, Castor, explores the feasibility ...
We address the problem of secure remote access to a site's internal web server from outside the rewall. The goal is to give authorized users access to sensitive information, ...
Christian Gilmore, David P. Kormann, Aviel D. Rubi...
—Privacy-Preserving Authentication (PPA) is crucial for Radio Frequency Identifcation (RFID)-enabled applications. Without appropriate formal privacy models, it is difficult for...