Ralf C. Hauser Does Licensing Require New Access Control Techniques? [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 1993, pp:1-8 [Conf]
Matt Blaze A Cryptographic File System for UNIX. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 1993, pp:9-16 [Conf]
Li Gong Lower Bounds on Messages and Rounds for Network Authentication Protocols. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 1993, pp:26-37 [Conf]
Raphael Yahalom Optimality of Multi-Domain Protocols. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 1993, pp:38-48 [Conf]
Kaisa Nyberg, Rainer A. Rueppel A New Signature Scheme Based on the DSA Giving Message Recovery. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 1993, pp:58-61 [Conf]
Mihir Bellare, Phillip Rogaway Random Oracles are Practical: A Paradigm for Designing Efficient Protocols. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 1993, pp:62-73 [Conf]
Birgit Pfitzmann Sorting Out Signature Schemes. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 1993, pp:74-85 [Conf]
Patrick W. Brown Digital Signatures: Can They be Accepted as Legal Signatures in EDI? [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 1993, pp:86-92 [Conf]
Paul F. Syverson Adding Time to a Logic of Authentication. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 1993, pp:97-101 [Conf]
Dan Brown Security Planning for Personal Communications. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 1993, pp:107-111 [Conf]
Hank M. Kluepfel Securing a Global Village and Its Resources: Baseline Security for Interconnected Signaling System #7 Telecommunications Networks. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 1993, pp:195-212 [Conf]
Gustavus J. Simmons Cryptanalysis and Protocol Failures (abstract). [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 1993, pp:213-214 [Conf]
Yvo Desmedt, Mike Burmester Towards Practical ``Proven Secure'' Authenticated Key Distribution. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 1993, pp:228-231 [Conf]
Paul C. van Oorschot Extending Cryptographic Logics of Belief to Key Agreement Protocols. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 1993, pp:232-243 [Conf]
Steven M. Bellovin, Michael Merritt Augmented Encrypted Key Exchange: A Password-Based Protocol Secure against Dictionary Attacks and Password File Compromise. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 1993, pp:244-250 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP