Publication
Private Authentication
Publication
A Logical Account of NGSCB
Video
How to Disembed a Program
This paper presents the theoretical blueprint of a new secure token called the Externalized Microprocessor (XmP). Unlike a smart-card, the XmP contains no ROM at all. While exporting all the device’s executable code to potentially…
Video
Online Auctions, Strategyproofness and Random Valuations
We discuss the limited-supply online auction problem, in which an auctioneer has k goods to sell and bidders arrive and depart dynamically, from a theoretical point of view and show how Economics, Scheduling theory, Probability…
Video
JET: Join-Exit Tree for Time Efficient Contributory Group Key Management
In secure group communications, the time cost associated with key updates for member join and departure is an important aspect of quality of service, especially in large groups with highly dynamic membership. To achieve better…