The successful deployment of a security policy is closely related not only to the complexity of the security requirements but also to the capabilities/functionalities of the secur...
Flexible and distributed management systems based on mobile agents have certain advantages over centralized and static management architectures. However, security plays a decisive...
Abstract: ZRTP is a protocol designed to set up a shared secret between two communication parties which is subsequently used to secure the media stream (i.e. the audio data) of a V...
Martin Petraschek, Thomas Hoeher, Oliver Jung, Hel...
The objective of the proposed work is to formally specify and implement a federated web service model in which the identity management problem and security features are analyzed. ...
S. Chandrasekaran, C. Dinesh, Kartic Ramesh, Al. M...