The SCEAS System
Navigation Menu

Conferences in DBLP

Conference on Computer and Communications Security (CCS) (ccs)
1993 (conf/ccs/1993)

  1. Ralf C. Hauser
    Does Licensing Require New Access Control Techniques? [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1993, pp:1-8 [Conf]
  2. Matt Blaze
    A Cryptographic File System for UNIX. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1993, pp:9-16 [Conf]
  3. Miguel Soriano, Jordi Forné, Francisco Recacha, José L. Melús
    A Particular Solution to Provide Secure Communications in an Ethernet Environment. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1993, pp:17-25 [Conf]
  4. Li Gong
    Lower Bounds on Messages and Rounds for Network Authentication Protocols. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1993, pp:26-37 [Conf]
  5. Raphael Yahalom
    Optimality of Multi-Domain Protocols. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1993, pp:38-48 [Conf]
  6. Gene Tsudik, Els Van Herreweghen
    On Simple and Secure Key Distribution. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1993, pp:49-57 [Conf]
  7. Kaisa Nyberg, Rainer A. Rueppel
    A New Signature Scheme Based on the DSA Giving Message Recovery. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1993, pp:58-61 [Conf]
  8. Mihir Bellare, Phillip Rogaway
    Random Oracles are Practical: A Paradigm for Designing Efficient Protocols. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1993, pp:62-73 [Conf]
  9. Birgit Pfitzmann
    Sorting Out Signature Schemes. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1993, pp:74-85 [Conf]
  10. Patrick W. Brown
    Digital Signatures: Can They be Accepted as Legal Signatures in EDI? [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1993, pp:86-92 [Conf]
  11. Donald B. Johnson, Stephen M. Matyas, An V. Le, John D. Wilkins
    Design of the Commercial Data Masking Facility Data Privacy Algorithm. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1993, pp:93-96 [Conf]
  12. Paul F. Syverson
    Adding Time to a Logic of Authentication. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1993, pp:97-101 [Conf]
  13. Gennady Medvinsky, B. Clifford Neuman
    NetCash: A Design for Practical Electronic Currency on the Internet. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1993, pp:102-106 [Conf]
  14. Dan Brown
    Security Planning for Personal Communications. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1993, pp:107-111 [Conf]
  15. Thomas Y. C. Woo, Simon S. Lam
    A Framework for Distributed Authorization. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1993, pp:112-118 [Conf]
  16. Myong H. Kang, Ira S. Moskowitz
    A Pump for Rapid, Reliable, Secure Communication. [Citation Graph (1, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1993, pp:119-129 [Conf]
  17. Elisa Bertino, Pierangela Samarati, Sushil Jajodia
    Authorizations in Relational Database Management Systems. [Citation Graph (2, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1993, pp:130-139 [Conf]
  18. Elisa Bertino, Pierangela Samarati, Sushil Jajodia
    High Assurance Discretionary Access Control for Object Bases. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1993, pp:140-150 [Conf]
  19. Roger M. Needham
    Denial of Service. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1993, pp:151-153 [Conf]
  20. Calvin Ko, Deborah A. Frincke, Terrance Goan, Todd Heberlein, Karl N. Levitt, Biswanath Mukherjee, Christopher Wee
    Analysis of an Algorithm for Distributed Recognition and Accountability. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1993, pp:154-164 [Conf]
  21. Ping Lin, C. Sekar Chandersekaran
    Integration of DCE and Local Registries: Design Approaches. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1993, pp:165-170 [Conf]
  22. Jennifer Seberry, Xian-Mo Zhang, Yuliang Zheng
    Systematic Generation of Cryptographically Robust S-Boxes. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1993, pp:171-182 [Conf]
  23. Bart Preneel, René Govaerts, Joos Vandewalle
    Differential Cryptanalysis of Hash Functions Based on Block Ciphers. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1993, pp:183-188 [Conf]
  24. Thomas Beth, Hans-Joachim Knobloch, Marcus Otten
    Verifiable Secret Sharing for Monotone Access Structures. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1993, pp:189-194 [Conf]
  25. Hank M. Kluepfel
    Securing a Global Village and Its Resources: Baseline Security for Interconnected Signaling System #7 Telecommunications Networks. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1993, pp:195-212 [Conf]
  26. Gustavus J. Simmons
    Cryptanalysis and Protocol Failures (abstract). [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1993, pp:213-214 [Conf]
  27. Ross J. Anderson
    Why Cryptosystems Fail. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1993, pp:215-227 [Conf]
  28. Yvo Desmedt, Mike Burmester
    Towards Practical ``Proven Secure'' Authenticated Key Distribution. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1993, pp:228-231 [Conf]
  29. Paul C. van Oorschot
    Extending Cryptographic Logics of Belief to Key Agreement Protocols. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1993, pp:232-243 [Conf]
  30. Steven M. Bellovin, Michael Merritt
    Augmented Encrypted Key Exchange: A Password-Based Protocol Secure against Dictionary Attacks and Password File Compromise. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1993, pp:244-250 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002