enter search term and/or author name
APSS: proactive secret sharing in asynchronous systems
Lidong Zhou, Fred B. Schneider, Robbert Van Renesse
APSS, a proactive secret sharing (PSS) protocol for asynchronous systems, is explained and proved correct. The protocol enables a set of secret shares to be periodically refreshed with a new, independent set, thereby thwarting mobile-adversary...
The concept of layered proving trees and its application to the automation of security protocol verification
Reiner Dojen, Tom Coffey
Security protocols are one of the most critical elements in enabling the secure communication and processing of information. The presence of flaws in published protocols highlights the complexity of security protocol design. Only formal verification...
Keystroke analysis of free text
Daniele Gunetti, Claudia Picardi
Keystroke dynamics can be useful to ascertain personal identity even after an authentication phase has been passed, provided that we are able to deal with the typing rhythms of free text, chosen and entered by users without any specific...