Sciweavers

7 search results - page 1 / 2
» compsec 2002
Sort
View
COMPSEC
2002
45views more  COMPSEC 2002»
14 years 10 months ago
Differentially secure multicasting and its implementation methods
S. Holeman, G. Manimaran, James Davis, Anirban Cha...
COMPSEC
2002
95views more  COMPSEC 2002»
14 years 10 months ago
Cryptanalysis of a Timestamp-Based Password Authentication Scheme
Chi-Kwong Chan, Lee-Ming Cheng
COMPSEC
2002
134views more  COMPSEC 2002»
14 years 10 months ago
The Open Source approach opportunities and limitations with respect to security and privacy
Today
Marit Hansen, Kristian Köhntopp, Andreas Pfit...
64
Voted
COMPSEC
2002
92views more  COMPSEC 2002»
14 years 10 months ago
A practical key management scheme for access control in a user hierarchy
In a user hierarchy we say that a security class is subordinate to another security class if the former has a lower security privilege than the latter. To implement such a hierarc...
Sheng Zhong