The SCEAS System
Navigation Menu

Conferences in DBLP

Conference on Computer and Communications Security (CCS) (ccs)
2000 (conf/ccs/2000)

  1. John Ioannidis, Angelos D. Keromytis
    Network security and IPsec (tutorial). [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2000, pp:- [Conf]
  2. Yair Frankel
    Electronic payment technologies. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2000, pp:- [Conf]
  3. John Iliadis, Diomidis Spinellis, Dimitris Gritzalis, Bart Preneel, Sokratis K. Katsikas
    Evaluating certificate status information mechanisms. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2000, pp:1-8 [Conf]
  4. Ahto Buldas, Peeter Laud, Helger Lipmaa
    Accountable certificate management using undeniable attestations. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2000, pp:9-17 [Conf]
  5. Rebecca N. Wright, Patrick Lincoln, Jonathan K. Millen
    Efficient fault-tolerant certificate revocation. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2000, pp:19-24 [Conf]
  6. Edward W. Felten, Michael A. Schneider
    Timing attacks on Web privacy. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2000, pp:25-32 [Conf]
  7. Clay Shields, Brian Neil Levine
    A protocol for anonymous communication over the Internet. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2000, pp:33-42 [Conf]
  8. Manfred Hauswirth, Clemens Kerer, Roman Kurmanowytsch
    A secure execution framework for Java. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2000, pp:43-52 [Conf]
  9. Pino Persiano, Ivan Visconti
    User privacy issues regarding certificates and the TLS protocol: the design and implementation of the SPSL protocol. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2000, pp:53-62 [Conf]
  10. Glenn Durfee, Matthew K. Franklin
    Distribution chain security. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2000, pp:63-70 [Conf]
  11. Joachim Biskup, Ulrich Flegel
    Threshold-based identity recovery for privacy enhanced applications. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2000, pp:71-79 [Conf]
  12. Yuji Watanabe, Hideki Imai
    Reducing the round complexity of a sealed-bid auction protocol with an off-line TTP. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2000, pp:80-86 [Conf]
  13. Michiharu Kudo, Satoshi Hada
    XML document security based on provisional authorization. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2000, pp:87-96 [Conf]
  14. Ravi Ganesan
    Security: the state of the practice (invited talk). [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2000, pp:97- [Conf]
  15. Carlisle M. Adams, Mike Burmester, Yvo Desmedt, Michael K. Reiter, Philip Zimmermann
    Which PKI (public key infrastructure) is the right one? (panel session). [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2000, pp:98-101 [Conf]
  16. Johannes Merkle
    Multi-round passive attacks on server-aided RSA protocols. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2000, pp:102-107 [Conf]
  17. Hugo Krawczyk
    Simple forward-secure signatures from any signature scheme. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2000, pp:108-115 [Conf]
  18. Yvo Desmedt, Tri Van Le
    Moiré cryptography. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2000, pp:116-124 [Conf]
  19. Johan Håstad, Jakob Jonsson, Ari Juels, Moti Yung
    Funkspiel schemes: an alternative to conventional tamper resistance. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2000, pp:125-133 [Conf]
  20. Piero A. Bonatti, Pierangela Samarati
    Regulating service access and information release on the Web. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2000, pp:134-143 [Conf]
  21. Avigdor Gal, Vijayalakshmi Atluri
    An authorization model for temporal data. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2000, pp:144-153 [Conf]
  22. Jonathon Tidswell, Trent Jaeger
    An access control model for simplifying constraint expression. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2000, pp:154-163 [Conf]
  23. Piero A. Bonatti, Sabrina De Capitani di Vimercati, Pierangela Samarati
    A modular approach to composing access control policies. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2000, pp:164-173 [Conf]
  24. Massimo Bernaschi, Emanuele Gabrielli, Luigi V. Mancini
    Operating system enhancements to prevent the misuse of system calls. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2000, pp:174-183 [Conf]
  25. Thomas W. Doeppner, Philip N. Klein, Andrew Koyfman
    Using router stamping to identify the source of IP packets. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2000, pp:184-189 [Conf]
  26. Sotiris Ioannidis, Angelos D. Keromytis, Steven M. Bellovin, Jonathan M. Smith
    Implementing a distributed firewall. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2000, pp:190-199 [Conf]
  27. Vijay Varadharajan
    Security enhanced mobile agents. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2000, pp:200-209 [Conf]
  28. Ting Yu, Xiaosong Ma, Marianne Winslett
    PRUNES: an efficient and complete strategy for automated trust negotiation over the Internet. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2000, pp:210-219 [Conf]
  29. Richard Au, Mark Looi, Paul Ashley
    Cross-domain one-shot authorization using smart cards. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2000, pp:220-227 [Conf]
  30. Reihaneh Safavi-Naini, Huaxiong Wang
    New constructions for multicast re-keying schemes using perfect hash families. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2000, pp:228-234 [Conf]
  31. Yongdae Kim, Adrian Perrig, Gene Tsudik
    Simple and fault-tolerant key agreement for dynamic collaborative groups. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2000, pp:235-244 [Conf]
  32. Birgit Pfitzmann, Michael Waidner
    Composition and integrity preservation of secure reactive systems. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2000, pp:245-254 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002