Sciweavers

COMPSEC
2000
53views more  COMPSEC 2000»
14 years 14 days ago
Opening Up The Enterprise
John Sherwood
COMPSEC
2000
117views more  COMPSEC 2000»
14 years 14 days ago
Methods for Protecting Password Transmission
Peyravian and Zunic (2000) proposed a password transmission scheme and a password change scheme over an insecure network. Their proposed solutions do not require the use of any sym...
Mohammad Peyravian, Nevenko Zunic
COMPSEC
2000
42views more  COMPSEC 2000»
14 years 14 days ago
Love Conquers All?
Stephen Hinde
COMPSEC
2000
47views more  COMPSEC 2000»
14 years 14 days ago
Who's to Blame?
Bill Hancock
COMPSEC
2000
112views more  COMPSEC 2000»
14 years 14 days ago
Securing The Electronic Market: The KEYSTONE Public Key Infrastructure Architecture
paper, the unified, abstract KEYSTONE Public Key Infrastructure is presented.This architecture consists of a reference model, a functional architecture specification, and a set of ...
Stefanos Gritzalis, Sokratis K. Katsikas, Dimitrio...