In this paper we present a new approach for network intrusion detection based on concise speciļ¬cations that characterize normal and abnormal network packet sequences. Our speciļ...
We present a novel approach to improving the security of passwords. In our approach, the legitimate userās typing patterns (e.g., durations of keystrokes and latencies between ke...
We describe and analyze a new digital signature scheme. The new scheme is quite eļ¬cient, does not require the the signer to maintain any state, and can be proven secure against ...
We have designed and implemented a general and powerful distributed authentication framework based on higher-order logic. Authentication frameworks ā including Taos, SPKI, SDSI,...
We introduce a technique for using an untrusted device, such as a hand-held personal digital assistant or a laptop to perform real nancial transactions without a network. We utili...