We propose a new architecture for a content protection system that conceals confidential data and algorithms in an FPGA as electrical circuits. This architecture is designed for a...
Policy-based messaging (PBM) aims at carrying security policies with messages, which will be enforced at recipient systems to provide security features. PBM promotes a distributed...
In peer-to-peer overlay for video broadcast, peers contribute a portion of the bandwidth to the overlay in return for the service. In the presence of network heterogeneity, it is ...
We present the design and implementation of a compiler that, given high-level multiparty session descriptions, generates custom cryptographic protocols. Our sessions specify pre-a...
Object-oriented technologies are frequently used to design and implement distributed applications. Object replication is a well-established approach to increase the dependability f...