Authentication protocols, run between a so-called prover and a so-called verifier, enable the verifier to decide whether a prover is legitimate or not. Such protocols enable access control, and are used in e.g.~logistics, public transport, or personal identification. An authentication protocol is considered secure if an adversary cannot impersonate a legitimate prover. Such an adversary may eavesdrop authentication attempts between a legitimate prover and a legitimate verifier, interact with either of the two honest parties, or perform a man-in-the-middle (MITM) attack, but without purely relaying messages between the honest parties (see Figure~\ref{fig:models} (a)). Distance-bounding is a feature that enables authentication protocols to...
This study is based on the twin exigencies of introducing the concept of abstract author into the sc...
This Zenodo record is a permanently preserved version of a PREreview. You can view the complete PREr...
Using design principles for social service delivery has produced old fashioned innovation, writes Ni...
Authentication protocols, run between a so-called prover and a so-called verifier, enable the verifi...
The term cryptography, by etymology or simply by association of ideas, suggests its connection with ...
Object-Based Selection of Spatial Frames of Reference in aṣ-Ṣāniˁ Arabic Introduction Levinson (2003...
The laws of history are as absolute as the laws of physics, and if the probabilities of...
La crescita incontrollata di dati prodotti da molte sorgenti, eterogenee e di- namiche, spinge molti...
Trust has been a topic of research in many disciplines for many years. Streams of research on trust ...
Throughout the past two decades there has been a resurgence of the concern with the rise of new grea...
Ubiquitous in airports, border checkpoints, and other securitised spaces throughout the world, full-...
Dr. Howard discussed the nature and background of behavioral finance, biases, heuristics, framing ef...
From the 1960s to the 1970s, a large number of Western inner cities went through a phase of severe d...
Kusko, B.H., S. Howard, T.A. Cahill, C. Higgins, and D. Evans. "Accelerator Based Analyses and the P...
The aim of this dissertation is twofold. Firstly, I will aim at showing the role that models play in...
This study is based on the twin exigencies of introducing the concept of abstract author into the sc...
This Zenodo record is a permanently preserved version of a PREreview. You can view the complete PREr...
Using design principles for social service delivery has produced old fashioned innovation, writes Ni...
Authentication protocols, run between a so-called prover and a so-called verifier, enable the verifi...
The term cryptography, by etymology or simply by association of ideas, suggests its connection with ...
Object-Based Selection of Spatial Frames of Reference in aṣ-Ṣāniˁ Arabic Introduction Levinson (2003...
The laws of history are as absolute as the laws of physics, and if the probabilities of...
La crescita incontrollata di dati prodotti da molte sorgenti, eterogenee e di- namiche, spinge molti...
Trust has been a topic of research in many disciplines for many years. Streams of research on trust ...
Throughout the past two decades there has been a resurgence of the concern with the rise of new grea...
Ubiquitous in airports, border checkpoints, and other securitised spaces throughout the world, full-...
Dr. Howard discussed the nature and background of behavioral finance, biases, heuristics, framing ef...
From the 1960s to the 1970s, a large number of Western inner cities went through a phase of severe d...
Kusko, B.H., S. Howard, T.A. Cahill, C. Higgins, and D. Evans. "Accelerator Based Analyses and the P...
The aim of this dissertation is twofold. Firstly, I will aim at showing the role that models play in...
This study is based on the twin exigencies of introducing the concept of abstract author into the sc...
This Zenodo record is a permanently preserved version of a PREreview. You can view the complete PREr...
Using design principles for social service delivery has produced old fashioned innovation, writes Ni...