In this work, we present a practical passive attack on SASI, an ultra-lightweight mutual authentication protocol for RFID. This attack can be used to reveal with overwhelming proba...
Gildas Avoine, Xavier Carpent, Benjamin Martin 000...
This article presents an ‘end-to-end’ integrity verification mechanism for use in minimally equipped secret paper-ballot election environments. The scheme presented in this pa...
This paper describes how information collected by enterprise system management (ESM) platforms can be utilized in a novel approach to assess the information assurance delivered by ...
1 -- Design of a Set-top Box (STB) is presented to provide virtual platforms such that it can support multiple service providers. Each service provider is able to manage its own mu...
Muhammad Shoaib Siddiqui, Choong Seon Hong, Young-...
There are several situations where applications in the cloud need to self-manage their quality attributes (QA). We posit that selfadaptation can be achieved through a market-based ...