Information dissemination is of vital importance in today's information-centric world. However, controlling the flow of information across multiple security domains is a probl...
In 2004, Kim, Huh, Hwang and Lee proposed an efficient key agreement protocol for secure authentication. In this paper, we shall show that their proposed protocol cannot resist th...
We propose a general security definition for cryptographic quantum protocols that implement classical non-reactive two-party tasks. The definition is expressed in terms of simple q...
In this paper, we present a way to think about the relative strength of security protocols using SoS, a lattice-theoretic representation of security strength. In particular, we di...
- In this paper, we propose a facilitator which finds capable and trustworthy partners on behalf of client users, which helps users form and maintain e-partnerships for electronic ...
Chihiro Ono, Dai Kanemoto, Keesoo Kim, Boyd C. Pau...