Distributed systems and applications are often expected to enforce high-level authorization policies. To this end, the code for these systems relies o...
JFK is a recent, attractive protocol for fast key establishment as part of securing IP communication. In this paper, we formally analyze this protocol...
It is well known that the Border Gateway Protocol (BGP), the IETF standard interdomain routing protocol, is vulnerable to a variety of attacks, and th...
Separation-of-duty (SoD) is widely considered to be a fundamental principle in computer security. A static SoD (SSoD) policy states that in order to h...
The batch verification technique of Bellare et al. is extended to verification of several frequently employed zero-knowledge proofs. The new technique...