Pino Persiano, Ivan Visconti User privacy issues regarding certificates and the TLS protocol: the design and implementation of the SPSL protocol. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2000, pp:53-62 [Conf]
Joachim Biskup, Ulrich Flegel Threshold-based identity recovery for privacy enhanced applications. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2000, pp:71-79 [Conf]
Yuji Watanabe, Hideki Imai Reducing the round complexity of a sealed-bid auction protocol with an off-line TTP. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2000, pp:80-86 [Conf]
Michiharu Kudo, Satoshi Hada XML document security based on provisional authorization. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2000, pp:87-96 [Conf]
Ravi Ganesan Security: the state of the practice (invited talk). [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2000, pp:97- [Conf]
Johannes Merkle Multi-round passive attacks on server-aided RSA protocols. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2000, pp:102-107 [Conf]
Hugo Krawczyk Simple forward-secure signatures from any signature scheme. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2000, pp:108-115 [Conf]
Jonathon Tidswell, Trent Jaeger An access control model for simplifying constraint expression. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2000, pp:154-163 [Conf]
Vijay Varadharajan Security enhanced mobile agents. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2000, pp:200-209 [Conf]
Ting Yu, Xiaosong Ma, Marianne Winslett PRUNES: an efficient and complete strategy for automated trust negotiation over the Internet. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2000, pp:210-219 [Conf]
Reihaneh Safavi-Naini, Huaxiong Wang New constructions for multicast re-keying schemes using perfect hash families. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2000, pp:228-234 [Conf]