— This paper analyzes the performance of a system architecture for the Authentication, Authorization, and Accounting (AAA), in a scenario where 3G users generate traffic and invo...
For successful software verification, model checkers must be capable of handling a large number of program variables. Traditional, BDD-based model checking is deficient in this re...
Mobile agent technology and Web Service technology compensate each other and play very important roles in eservice applications. The mechanism of Web Services technology naturally...
We introduce a protocol, that we call Human Key Agreement, that allows pairs of humans to establish a key in a (seemingly hopeless) case where no public-key infrastructure is avail...
This paper introduces the method secure-by-design as a way of constructing wireless embedded systems using component-based modeling frameworks. This facilitates design of secure a...