Sciweavers

54 search results - page 5 / 11
» compsec 2008
Sort
View
COMPSEC
2006
98views more  COMPSEC 2006»
13 years 7 months ago
A secure extension of the Kwak-Moon group signcryption scheme
Dong Jin Kwak, Sang-Jae Moon, Guilin Wang, Robert ...
COMPSEC
2002
134views more  COMPSEC 2002»
13 years 7 months ago
The Open Source approach opportunities and limitations with respect to security and privacy
Today
Marit Hansen, Kristian Köhntopp, Andreas Pfit...
COMPSEC
2004
181views more  COMPSEC 2004»
13 years 7 months ago
The 10 deadly sins of information security management
This paper identifies 10 essential aspects, which, if not taken into account in an information security governance plan, will surely cause the plan to fail, or at least, cause seri...
Sebastiaan H. von Solms, Rossouw von Solms
COMPSEC
2006
94views more  COMPSEC 2006»
13 years 7 months ago
A novel remote user authentication scheme using bilinear pairings
Recently Manik et al. [13] proposed a novel remote user authentication scheme using bilinear pairings. Chou et al. [14] identified a weakness in Manik et al.'s scheme and mad...
Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati...