Sciweavers

7 search results - page 1 / 2
» compsec 2002
Sort
View
COMPSEC
2002
45views more  COMPSEC 2002»
13 years 4 months ago
Differentially secure multicasting and its implementation methods
S. Holeman, G. Manimaran, James Davis, Anirban Cha...
COMPSEC
2002
95views more  COMPSEC 2002»
13 years 4 months ago
Cryptanalysis of a Timestamp-Based Password Authentication Scheme
Chi-Kwong Chan, Lee-Ming Cheng
COMPSEC
2002
134views more  COMPSEC 2002»
13 years 4 months ago
The Open Source approach opportunities and limitations with respect to security and privacy
Today
Marit Hansen, Kristian Köhntopp, Andreas Pfit...
COMPSEC
2002
92views more  COMPSEC 2002»
13 years 4 months ago
A practical key management scheme for access control in a user hierarchy
In a user hierarchy we say that a security class is subordinate to another security class if the former has a lower security privilege than the latter. To implement such a hierarc...
Sheng Zhong