One interesting and important challenge for the cryptologic community is that of providing secure authentication and identification for unassisted humans. There are a range of prot...
One of the major challenges in IT security management is determining how much to spend and where to spend. This requires understanding of the economic issues regarding IT security...
To secure interactive multimedia applications in wireless LANs WLANs it is pertinent to implement a number of security services such as authentication, key exchange and real-time e...
The software industry is currently experiencing a paradigm shift towards web-based software. We argue that web technologies should evolve in a direction that would allow the devel...
A vast amount of literature on stream ciphers is directed to the cryptanalysis of LFSR-based filters and combiners, resulting in various attack models such as distinguishing attac...