The SCEAS System
Navigation Menu

Conferences in DBLP

Conference on Computer and Communications Security (CCS) (ccs)
1998 (conf/ccs/1998)

  1. Klaus Becker, Uta Wille
    Communication Complexity of Group Key Distribution. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1998, pp:1-6 [Conf]
  2. Avishai Wool
    Key Management for Encrypted broadcast. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1998, pp:7-16 [Conf]
  3. Giuseppe Ateniese, Michael Steiner, Gene Tsudik
    Authenticated Group Key Agreement and Friends. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1998, pp:17-26 [Conf]
  4. David Mazières, M. Frans Kaashoek
    The Design, Implementation and Operation of an Email Pseudonym Server. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1998, pp:27-36 [Conf]
  5. Paul F. Syverson
    Anonymity on the Internet (Panel). [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1998, pp:37- [Conf]
  6. Guy Edjlali, Anurag Acharya, Vipin Chaudhary
    History-Based Access Control for Mobile Code. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1998, pp:38-48 [Conf]
  7. Allen Goldberg
    A Specification of Java Loading and Bytecode Verification. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1998, pp:49-58 [Conf]
  8. David Naccache, Jacques Stern
    A New Public Key Cryptosystem Based on Higher Residues. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1998, pp:59-66 [Conf]
  9. Rosario Gennaro, Daniele Micciancio, Tal Rabin
    An Efficient Non-Interactive Statistical Zero-Knowledge Proof System for Quasi-Safe Prime Products. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1998, pp:67-72 [Conf]
  10. Alfredo De Santis, Giovanni Di Crescenzo, Giuseppe Persiano
    Communication-Efficient Anonymous Group Identification. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1998, pp:73-82 [Conf]
  11. Ian T. Foster, Carl Kesselman, Gene Tsudik, Steven Tuecke
    A Security Architecture for Computational Grids. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1998, pp:83-92 [Conf]
  12. Jun Xu, Mukesh Singhal
    Design of a High-Performance ATM Firewall. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1998, pp:93-102 [Conf]
  13. Markus Jakobsson, Elizabeth A. M. Shriver, Bruce Hillyer, Ari Juels
    A Practical Secure Physical Random Bit Generator. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1998, pp:103-111 [Conf]
  14. Patrick Lincoln, John C. Mitchell, Mark Mitchell, Andre Scedrov
    A Probabilistic Poly-Time Framework for Protocol Analysis. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1998, pp:112-121 [Conf]
  15. Shai Halevi, Hugo Krawczyk
    Public-Key Cryptography and Password Protocols. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1998, pp:122-131 [Conf]
  16. Bruce Schneier, Mudge
    Cryptanalysis of Microsoft's Point-to-Point Tunneling Protocol (PPTP). [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1998, pp:132-141 [Conf]
  17. Eran Gabber, Avishai Wool
    How to Prove Where You Are: Tracking the Location of Customer Equipment. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1998, pp:142-149 [Conf]
  18. Terran Lane, Carla E. Brodley
    Temporal Sequence Learning and Data Reduction for Anomaly Detection. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1998, pp:150-158 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002