Abstract. This paper presents a novel framework to substantiate selfsigned certificates in the absence of a trusted certificate authority. In particular, we aim to address the prob...
Brett Stone-Gross, David Sigal, Rob Cohn, John Mor...
Information theory provides a range of useful methods to analyse probability distributions and these techniques have been successfully applied to measure information flow and the ...
Konstantinos Chatzikokolakis, Tom Chothia, Apratim...
—Identifiers are an essential component of online communication. My research focuses on the ways that social, technical and policy factors affect people’s behavior with online...
We introduce a variant of the random oracle model where oracle-dependent auxiliary input is allowed. In this setting, the adversary gets an auxiliary input that can contain informa...
: The paper introduces a new anti-virus idea of Software Vaccine technique. It can apply the security technique inside the software itself. By inserting the software vaccine into t...