Location-hidden services, as offered by anonymity systems such as Tor, allow servers to be operated under a pseudonym. As Tor is an overlay network, servers hosting hidden service...
In this paper, we present the idea of offline count-limited certificates (or clics for short), and show how these can be implemented using minimal trusted hardware functionality a...
Luis F. G. Sarmenta, Marten van Dijk, Jonathan Rho...
In large organizations the administration of access privileges (such as the assignment of an access right to a user in a particular role) is handled cooperatively through distribu...
The kernel objects consist of critical kernel data structures and system call functions, which are the most important data for a system, should be protected as first-class candida...
In recent years research activities in computer network security focus more actively on the development of effective methods in intrusion detection. The reason for this developmen...