Sciweavers

COMPSEC
2006
84views more  COMPSEC 2006»
13 years 11 months ago
A framework and taxonomy for comparison of electronic voting schemes
Krishna Sampigethaya, Radha Poovendran
COMPSEC
2006
97views more  COMPSEC 2006»
13 years 11 months ago
Towards a location-based mandatory access control model
With the growing use of wireless networks and mobile devices, we are moving towards an era where location information will be necessary for access control. The use of location inf...
Indrakshi Ray, Mahendra Kumar
COMPSEC
2006
56views more  COMPSEC 2006»
13 years 11 months ago
A new protocol to counter online dictionary attacks
Vipul Goyal, Virendra Kumar, Mayank Singh, Ajith A...
COMPSEC
2006
143views more  COMPSEC 2006»
13 years 11 months ago
A novel approach for computer security education using Minix instructional operating system
To address national needs for computer security education, many universities have incorporated computer and security courses into their undergraduate and graduate curricula. In th...
Wenliang Du, Mingdong Shang, Haizhi Xu
COMPSEC
2006
94views more  COMPSEC 2006»
13 years 11 months ago
A novel remote user authentication scheme using bilinear pairings
Recently Manik et al. [13] proposed a novel remote user authentication scheme using bilinear pairings. Chou et al. [14] identified a weakness in Manik et al.'s scheme and mad...
Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati...
COMPSEC
2006
65views more  COMPSEC 2006»
13 years 11 months ago
Re-engineering enterprise security
Robert Booker