We present an architecture for detecting “zero-day” worms and viruses in incoming email. Our main idea is to intercept every incoming message, prescan it for potentially danger...
Stelios Sidiroglou, John Ioannidis, Angelos D. Ker...
This paper describes a method of exchanging tacit community knowledge using talking-virtualized-egos. We aim at sharing tacit knowledge in a community, for this purpose, we propos...
Secure systems are best built on top of a small trusted operating system: The smaller the operating system, the easier it can be assured or verified for correctness. In this pape...
Abstract. In formal approaches, messages sent over a network are usually modeled by terms together with an equational theory, axiomatizing the properties of the cryptographic funct...
Abstract. The use of biometrics, and fingerprint recognition in particular, for cardholder authentication in smartcard systems is growing in popularity, and such systems are the f...