Within the field of software security we have yet to find efficient ways on how to learn from past mistakes and integrate security as a natural part of software development. Th...
Abstract. Information integrity is a vital security property in a variety of applications. However, there is more than one facet to integrity: interpretations of integrity in diffe...
Arnar Birgisson, Alejandro Russo, Andrei Sabelfeld
—Risk assessment is a very important tool to acquire a present and future security status of the network information system. Many risk assessment approaches consider the present ...
Cui Xiaolin, Xiaobin Tan, Zhang Yong, Hongsheng Xi
In today's society, people have very little control over what kinds of personal data are collected and stored by various agencies in both the private and public sectors. We de...
An information-theoretic model for steganography with passive adversaries is proposed. The adversary's task of distinguishing between an innocent cover message C and a modi e...