Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
PDF Tools
Image Tools
Text Tools
OCR Tools
Symbol and Emoji Tools
On-screen Keyboard
Latex Math Equation to Image
Smart IPA Phonetic Keyboard
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
7
search results - page 1 / 2
»
compsec 2002
Sort
relevance
views
votes
recent
update
View
thumb
title
84
Voted
COMPSEC
2002
58
views
more
COMPSEC 2002
»
The gap between cryptography and information security
15 years 2 months ago
Download
www.ebusinessforum.gr
E. Eugene Schultz
claim paper
Read More »
87
Voted
COMPSEC
2002
45
views
more
COMPSEC 2002
»
Differentially secure multicasting and its implementation methods
15 years 2 months ago
Download
vulcan.ee.iastate.edu
S. Holeman, G. Manimaran, James Davis, Anirban Cha...
claim paper
Read More »
87
Voted
COMPSEC
2002
95
views
more
COMPSEC 2002
»
Cryptanalysis of a Timestamp-Based Password Authentication Scheme
15 years 2 months ago
Download
eprint.iacr.org
Chi-Kwong Chan, Lee-Ming Cheng
claim paper
Read More »
109
Voted
COMPSEC
2002
134
views
more
COMPSEC 2002
»
The Open Source approach opportunities and limitations with respect to security and privacy
15 years 2 months ago
Download
dud.inf.tu-dresden.de
Today
Marit Hansen, Kristian Köhntopp, Andreas Pfit...
claim paper
Read More »
89
Voted
COMPSEC
2002
92
views
more
COMPSEC 2002
»
A practical key management scheme for access control in a user hierarchy
15 years 2 months ago
Download
www.cse.buffalo.edu
In a user hierarchy we say that a security class is subordinate to another security class if the former has a lower security privilege than the latter. To implement such a hierarc...
Sheng Zhong
claim paper
Read More »
« Prev
« First
page 1 / 2
Last »
Next »