Security is an elusive target in today’s high-speed and extremely complex, Web enabled, information rich business environment. This paper presents the idea that there are essent...
Assuring information authenticity is an important issue in the field of information security. A new broadcast authentication protocol is proposed. The protocol is based on time sy...
The formidable difficulty in securing systems stems in large part from the increasing complexity of the systems we build but also the degree to which we now depend on information ...
Service-oriented architectures (SOAs) are a commonly used paradigm for IT infrastructures in various fields. Due to their flexibility and the easy accessibility of their underly...
— Node compromise is a serious threat in wireless sensor networks. An adversary can use compromised nodes to inject false data into the network forging events to deceive the base...
The use of one-way chains in authentication protocols is a technique of great importance which has many applications. Employing cryptographic techniques in the area of industrial ...
The NuBric behaviour control framework (BCF) is a near-real-time framework written entirely in Java based on the paradigms of both role based access control (RBAC) and policy base...
The effectiveness of current anti-spam systems is limited by the ability of spammers to adapt to new filtering techniques and the lack of incentive for mail domains to filter outg...
— The current standard for Fault-Tolerance in the Common Object Request Broker Architecture (CORBA) does not support network partitioning. However, distributed systems, and those...