: Certificateless cryptography is a promising technology for solving the key escrow problem in identity-based cryptography. However, the lack of a unified set of definitions and se...
In this paper, we propose a conceptual framework for developing a family of models for Group-Centric information sharing. The traditional approach to information sharing, characte...
Ram Krishnan, Ravi S. Sandhu, Jianwei Niu, William...
Security Management is a complex task. It requires several interconnected activities: designing, implementing and maintaining a robust technical infrastructure, developing suitable...
Jose Maria Sarriegi, Javier Santos, Jose M. Torres...
This paper considers the problem of using wireless LAN locationsensing for security applications. Recently, Bayesian methods have been successfully used to determine location from...
Ping Tao, Algis Rudys, Andrew M. Ladd, Dan S. Wall...
We extend the partial order reduction algorithm of Clarke et al. [CJM00] to handle branching security protocols, such as optimistic fair exchange protocols. Applications of the pro...