The increased functionality of EPC Class1 Gen2 (EPCGen2) is making this standard a de facto specification for inexpensive tags in the RFID industry. Recently three EPCGen2 complian...
Mike Burmester, Breno de Medeiros, Jorge Munilla, ...
We study the specification of access control policy in large-scale distributed systems. We present Cassandra, a language and system for expressing policy, and the results of a sub...
In this paper we show how to simulate attacks on authentication protocols in a realistic environment. The attack on the Needham-Schroeder public key protocol found by Gavin Lowe i...
Multipath routing minimizes the consequences of security attacks deriving from collaborating malicious nodes in MANET, by maximizing the number of nodes that an adversary must com...
Panayiotis Kotzanikolaou, Rosa Mavropodi, Christos...
Various researches have proposed multiple protocols within 802.11 security to protect and authenticate access to wireless LAN. This paper presents the first implementation of EAP-...