Sciweavers

COMPSEC
2000
53views more  COMPSEC 2000»
13 years 4 months ago
Opening Up The Enterprise
John Sherwood
COMPSEC
2000
117views more  COMPSEC 2000»
13 years 4 months ago
Methods for Protecting Password Transmission
Peyravian and Zunic (2000) proposed a password transmission scheme and a password change scheme over an insecure network. Their proposed solutions do not require the use of any sym...
Mohammad Peyravian, Nevenko Zunic
COMPSEC
2000
42views more  COMPSEC 2000»
13 years 4 months ago
Love Conquers All?
Stephen Hinde
COMPSEC
2000
47views more  COMPSEC 2000»
13 years 4 months ago
Who's to Blame?
Bill Hancock
COMPSEC
2000
112views more  COMPSEC 2000»
13 years 4 months ago
Securing The Electronic Market: The KEYSTONE Public Key Infrastructure Architecture
paper, the unified, abstract KEYSTONE Public Key Infrastructure is presented.This architecture consists of a reference model, a functional architecture specification, and a set of ...
Stefanos Gritzalis, Sokratis K. Katsikas, Dimitrio...