Sciweavers

59
Voted
COMPSEC
2006
84views more  COMPSEC 2006»
15 years 14 days ago
A framework and taxonomy for comparison of electronic voting schemes
Krishna Sampigethaya, Radha Poovendran
105
Voted
COMPSEC
2006
97views more  COMPSEC 2006»
15 years 14 days ago
Towards a location-based mandatory access control model
With the growing use of wireless networks and mobile devices, we are moving towards an era where location information will be necessary for access control. The use of location inf...
Indrakshi Ray, Mahendra Kumar
56
Voted
COMPSEC
2006
91views more  COMPSEC 2006»
15 years 14 days ago
Security considerations for incremental hash functions based on pair block chaining
Raphael Chung-Wei Phan, David Wagner
52
Voted
COMPSEC
2006
105views more  COMPSEC 2006»
15 years 14 days ago
Steganography in games: A general methodology and its application to the game of Go
Julio César Hernández Castro, Ignaci...
50
Voted
COMPSEC
2006
56views more  COMPSEC 2006»
15 years 14 days ago
A new protocol to counter online dictionary attacks
Vipul Goyal, Virendra Kumar, Mayank Singh, Ajith A...
107
Voted
COMPSEC
2006
143views more  COMPSEC 2006»
15 years 14 days ago
A novel approach for computer security education using Minix instructional operating system
To address national needs for computer security education, many universities have incorporated computer and security courses into their undergraduate and graduate curricula. In th...
Wenliang Du, Mingdong Shang, Haizhi Xu
96
Voted
COMPSEC
2006
94views more  COMPSEC 2006»
15 years 14 days ago
A novel remote user authentication scheme using bilinear pairings
Recently Manik et al. [13] proposed a novel remote user authentication scheme using bilinear pairings. Chou et al. [14] identified a weakness in Manik et al.'s scheme and mad...
Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati...
COMPSEC
2006
65views more  COMPSEC 2006»
15 years 14 days ago
Re-engineering enterprise security
Robert Booker