Sciweavers

18 search results - page 3 / 4
» compsec 2006
Sort
View
COMPSEC
2006
94views more  COMPSEC 2006»
13 years 5 months ago
A novel remote user authentication scheme using bilinear pairings
Recently Manik et al. [13] proposed a novel remote user authentication scheme using bilinear pairings. Chou et al. [14] identified a weakness in Manik et al.'s scheme and mad...
Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati...
COMPSEC
2006
141views more  COMPSEC 2006»
13 years 5 months ago
Comparing Java and .NET security: Lessons learned and missed
Many systems execute untrusted programs in virtual machines (VMs) to limit their access to system resources. Sun introduced the Java VM in 1995, primarily intended as a lightweigh...
Nathanael Paul, David Evans
COMPSEC
2006
98views more  COMPSEC 2006»
13 years 5 months ago
A Secure Identification and Key agreement protocol with user Anonymity (SIKA)
Anonymity is a desirable security feature in addition to providing user identification and key agreement during a user's login process. Recently, Yang et al., proposed an eff...
Kumar V. Mangipudi, Rajendra S. Katti
COMPSEC
2006
90views more  COMPSEC 2006»
13 years 5 months ago
On Incident Handling and Response: A state-of-the-art approach
Incident Response has always been an important aspect of Information Security but it is often overlooked by security administrators. Responding to an incident is not solely a techn...
Sarandis Mitropoulos, Dimitrios Patsos, Christos D...
COMPSEC
2006
132views more  COMPSEC 2006»
13 years 5 months ago
Tightening the net: A review of current and next generation spam filtering tools
This paper provides an overview of current and potential future spam filtering approaches. We examine the problems spam introduces, what spam is and how we can measure it. The pap...
James Carpinter, Ray Hunt