Communications systems, encompassing VoIP, IM, and other personal media, present different challenges for P2P environments than other P2P applications. In particular, reliable com...
Abstract—The security mechanisms employed in current networked environments are increasingly complex, and their configuration management has an important role for the protection...
Secure chips, e.g. present in smart cards, TPM, USB dongles are now ubiquitous in applications with strong security requirements. Secure chips host personal data that must be care...
Although there is a substantial amount of work on formal requirements for two and three-party key distribution protocols, very little has been done on requirements for group proto...
Enterprises use security equipments in order to protect their information assets from various attacks such as viruses and hacking. However, such individual equipments hardly provid...
Yoonsun Lim, Myung Kim, Kwang Hee Seo, Ho-Kun Moon...