This paper studies the interplay of network connectivity and perfectly secure message transmission under the corrupting influence of a Byzantine mobile adversary that may move from...
Kannan Srinathan, Prasad Raghavendra, C. Pandu Ran...
Application security is typically coded in the application. In kernelSec, we are investigating mechanisms to implement application security in an operating system kernel. The mech...
The drive from the South African Government towards the adoption of open source software across all platforms, incurred a number of research and development questions. The open so...
Security is gaining relevance in the development of embedded devices. Toward a secure system at each level of design, this paper addresses security aspects related to Network-on-Ch...
Abstract--This paper studies the application of an approach to enhance information security awareness amongst employees within middleeastern companies, in effort to improve informa...