publié le: April 2009
We introduce the notion of resiliency policies in the context of access control systems. Such policies require an access control system to be resilie...
As the number of RFID applications grows, concerns about their security and privacy become greatly amplified. At the same time, the acutely restricte...
A covert channel can occur when an attacker finds and exploits a shared resource that is not designed to be a communication mechanism. A network cove...
publié le: October 2009
In automated trust negotiation (ATN), two parties exchange digitally signed credentials that contain attribute information to establish trust and mak...
We examine the problem of keyboard acoustic emanations.We present a novel attack taking as input a 10-minute sound recording of a user typing English...