We consider the problem of implementing a security protocol in such a manner that secrecy of sensitive data is not jeopardized. Implementation is assumed to take place in the cont...
Abstract. The World Wide Web (WWW) was originally designed to handle relatively simple files, containing just text and graphics. With the development of more advanced Web browsers...
Cross-layer mechanism, for which a protocol locating at a given layer uses information issued from other layers, may enhance the mobile networks performance. Some of those mechanis...
Abstract. In this paper we consider a new and efficient optimistic nonrepudiation protocol. In a non-repudiation protocol, during which Alice wants to transmit a message to Bob, Al...
Adaptive security, while more realistic as an adversarial model, is typically much harder to achieve compared to static security in cryptographic protocol design. Universal composi...