The SCEAS System
Navigation Menu

Conferences in DBLP

Conference on Computer and Communications Security (CCS) (ccs)
2008 (conf/ccs/2008asia)

  1. Confronting a mobile adversary in unattended sensor networks. [Citation Graph (, )][DBLP]

  2. Prototyping security test objects for use with advanced biometric authentication systems. [Citation Graph (, )][DBLP]

  3. A strict evaluation method on the number of conditions for the SHA-1 collision search. [Citation Graph (, )][DBLP]

  4. HMAC is a randomness extractor and applications to TLS. [Citation Graph (, )][DBLP]

  5. An overview of side channel analysis attacks. [Citation Graph (, )][DBLP]

  6. Avoiding timing channels in fixed-priority schedulers. [Citation Graph (, )][DBLP]

  7. A block cipher based pseudo random number generator secure against side-channel key recovery. [Citation Graph (, )][DBLP]

  8. On the protocol composition logic PCL. [Citation Graph (, )][DBLP]

  9. An integrated framework for security protocol analysis. [Citation Graph (, )][DBLP]

  10. Computationally sound mechanized proofs for basic and public-key Kerberos. [Citation Graph (, )][DBLP]

  11. CMV: automatic verification of complete mediation for java virtual machines. [Citation Graph (, )][DBLP]

  12. Secure slices of insecure programs. [Citation Graph (, )][DBLP]

  13. Verified implementations of the information card federated identity-management protocol. [Citation Graph (, )][DBLP]

  14. Principled reasoning and practical applications of alert fusion in intrusion detection systems. [Citation Graph (, )][DBLP]

  15. Detecting VoIP based DoS attacks at the public safety answering point. [Citation Graph (, )][DBLP]

  16. A practical mimicry attack against powerful system-call monitors. [Citation Graph (, )][DBLP]

  17. SNAPP: stateless network-authenticated path pinning. [Citation Graph (, )][DBLP]

  18. A general model of probabilistic packet marking for IP traceback. [Citation Graph (, )][DBLP]

  19. Secure neighbor discovery in wireless networks: formal investigation of possibility. [Citation Graph (, )][DBLP]

  20. SEAR: a secure efficient ad hoc on demand routing protocol for wireless networks. [Citation Graph (, )][DBLP]

  21. On spatio-temporal constraints and inheritance in role-based access control. [Citation Graph (, )][DBLP]

  22. Online subscriptions with anonymous access. [Citation Graph (, )][DBLP]

  23. Towards an efficient and language-agnostic compliance checker for trust negotiation systems. [Citation Graph (, )][DBLP]

  24. Mechanisms for usage control. [Citation Graph (, )][DBLP]

  25. Usage control platformization via trustworthy SELinux. [Citation Graph (, )][DBLP]

  26. Securing group key exchange against strong corruptions. [Citation Graph (, )][DBLP]

  27. Security arguments for the UM key agreement protocol in the NIST SP 800-56A standard. [Citation Graph (, )][DBLP]

  28. Non-interactive conference key distribution and its applications. [Citation Graph (, )][DBLP]

  29. Robust, anonymous RFID authentication with constant key-lookup. [Citation Graph (, )][DBLP]

  30. Mutual authentication in RFID: security and privacy. [Citation Graph (, )][DBLP]

  31. Provably secure browser-based user-aware mutual authentication over TLS. [Citation Graph (, )][DBLP]

  32. Private combinatorial group testing. [Citation Graph (, )][DBLP]

  33. Controlled privacy preserving keyword search. [Citation Graph (, )][DBLP]

  34. Exploiting social networks for threshold signing: attack-resilience vs. availability. [Citation Graph (, )][DBLP]

  35. A short anonymously revocable group signature scheme from decision linear assumption. [Citation Graph (, )][DBLP]

  36. Practical forward secure sequential aggregate signatures. [Citation Graph (, )][DBLP]

  37. Efficient signature schemes supporting redaction, pseudonymization, and data deidentification. [Citation Graph (, )][DBLP]

  38. Efficient designated confirmer signature from bilinear pairings. [Citation Graph (, )][DBLP]

  39. Certificateless signcryption. [Citation Graph (, )][DBLP]

  40. Cryptanalysis and improvement of a multi-receiver identity-based key encapsulation at INDOCRYPT 06. [Citation Graph (, )][DBLP]

  41. Stateful identity-based encryption scheme: faster encryption and decryption. [Citation Graph (, )][DBLP]

System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002