The SCEAS System
Navigation Menu

Conferences in DBLP

Conference on Computer and Communications Security (CCS) (ccs)
1994 (conf/ccs/1994)

  1. Trent Jaeger, Atul Prakash
    Support for the File System Security Requirements of Computational E-Mail Systems. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1994, pp:1-9 [Conf]
  2. Vaduvur Bharghavan
    Secure Wireless LANs. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1994, pp:10-17 [Conf]
  3. Gene H. Kim, Eugene H. Spafford
    The Design and Implementation of Tripwire: A File System Integrity Checker. [Citation Graph (1, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1994, pp:18-29 [Conf]
  4. Marjan Jurecic, Herbert Bunz
    Exchange of Patient Records - Prototype Implementation of a Security Attributes Service in X.500. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1994, pp:30-38 [Conf]
  5. Edward Amoroso, Carol Taylor, John Watson, Jonathan Weiss
    A Process-Oriented Methodology for Assessing and Improving Software Trustworthiness. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1994, pp:39-50 [Conf]
  6. Thomas Beth, Hans-Joachim Knobloch, Marcus Otten, Gustavus J. Simmons, Peer Wichmann
    Towards Acceptable Key Escrow Systems. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1994, pp:51-58 [Conf]
  7. Matt Blaze
    Protocol Failure in the Escrowed Encryption Standard. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1994, pp:59-67 [Conf]
  8. Michael K. Reiter
    Secure Agreement Protocols: Reliable and Atomic Group Multicast in Rampart. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1994, pp:68-80 [Conf]
  9. Mike Just, Evangelos Kranakis, Danny Krizanc, Paul C. van Oorschot
    On Key Distribution via True Broadcasting. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1994, pp:81-88 [Conf]
  10. Chris Charnes, Josef Pieprzyk, Reihaneh Safavi-Naini
    Conditionally Secure Secret Sharing Schemes with Disenrollment Capability. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1994, pp:89-95 [Conf]
  11. Patrick Horster, Holger Petersen, Markus Michels
    Meta-ElGamal Signature Schemes. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1994, pp:96-107 [Conf]
  12. Steven H. Low, Sanjoy Paul, Nicholas F. Maxemchuk
    Anonymous Credit Cards. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1994, pp:108-117 [Conf]
  13. Paul Ammann, Sushil Jajodia
    An Efficient Multiversion Algorithm for Secure Servicing of Transaction Reads. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1994, pp:118-125 [Conf]
  14. Elisa Bertino, Claudio Bettini, Pierangela Samarati
    A Temporal Authorization Model. [Citation Graph (2, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1994, pp:126-135 [Conf]
  15. Pierangela Samarati, Paul Ammann, Sushil Jajodia
    Propagation of Authorizations in Distributed Database Systems. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1994, pp:136-147 [Conf]
  16. Howard M. Heys, Stafford E. Tavares
    The Design of Substitution-Permutation Networks Resistant to Differential and Linear Cryptanalysis. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1994, pp:148-155 [Conf]
  17. M. Zhang, Stafford E. Tavares, L. L. Campbell
    Information Leakage of Boolean Functions and Its Relationship to Other Cryptographic Criteria. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1994, pp:156-165 [Conf]
  18. L. Tombak, Reihaneh Safavi-Naini
    Authentication Codes That Are r-Fold Secure Against Spoofing. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1994, pp:166-169 [Conf]
  19. Gennady Medvinsky, Charlie Lai, B. Clifford Neuman
    Endorsements, Licensing, and Insurance for Distributed System Services. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1994, pp:170-175 [Conf]
  20. Li Gong
    New Protocols for Third-Party-Based Authentication and Secure Broadcast. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1994, pp:176-183 [Conf]
  21. Tatsuaki Okamoto, Kazuo Ohta
    How to Simultaneously Exchange Secrets by General Assumptions. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1994, pp:184-192 [Conf]
  22. Warwick Ford, Michael J. Wiener
    A Key Distribution Method for Object-Based Protection. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1994, pp:193-197 [Conf]
  23. Thomas R. Cain, Alan T. Sherman
    How to Break Gifford's Cipher (extended abstract). [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1994, pp:198-209 [Conf]
  24. Paul C. van Oorschot, Michael J. Wiener
    Parallel Collision Search with Application to Hash Functions and Discrete Logarithms. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1994, pp:210-218 [Conf]
  25. Refik Molva, Erich Rütsche
    Application Access Control at Network Level. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1994, pp:219-228 [Conf]
  26. P. Rolin, Laurent Toutain, Sylvain Gombault
    Network Security Probe. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1994, pp:229-240 [Conf]
  27. Alison Anderson, Dennis Longley, Lam-for Kwok
    Security Modelling for Organisations. [Citation Graph (1, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1994, pp:241-250 [Conf]
  28. James W. Coyne, Norman C. Kluksdahl
    ``Mainstreaming'' Automated Information Systems Security Engineering (a case study in security run amok). [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1994, pp:251-257 [Conf]
  29. Heather M. Hinton, E. Stewart Lee
    The Compatibility of Policies. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1994, pp:258-269 [Conf]
  30. Randy Browne
    An Entropy Conservation Law for Testing the Completeness of Convert Channel Analysis. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1994, pp:270-281 [Conf]
  31. John P. Nestor, E. S. Lee
    Prerequisite Confidentiality. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1994, pp:282-293 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002