Trent Jaeger, Atul Prakash Support for the File System Security Requirements of Computational E-Mail Systems. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 1994, pp:1-9 [Conf]
Gene H. Kim, Eugene H. Spafford The Design and Implementation of Tripwire: A File System Integrity Checker. [Citation Graph (1, 0)][DBLP] ACM Conference on Computer and Communications Security, 1994, pp:18-29 [Conf]
Marjan Jurecic, Herbert Bunz Exchange of Patient Records - Prototype Implementation of a Security Attributes Service in X.500. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 1994, pp:30-38 [Conf]
Matt Blaze Protocol Failure in the Escrowed Encryption Standard. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 1994, pp:59-67 [Conf]
Michael K. Reiter Secure Agreement Protocols: Reliable and Atomic Group Multicast in Rampart. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 1994, pp:68-80 [Conf]
Paul Ammann, Sushil Jajodia An Efficient Multiversion Algorithm for Secure Servicing of Transaction Reads. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 1994, pp:118-125 [Conf]
Howard M. Heys, Stafford E. Tavares The Design of Substitution-Permutation Networks Resistant to Differential and Linear Cryptanalysis. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 1994, pp:148-155 [Conf]
Li Gong New Protocols for Third-Party-Based Authentication and Secure Broadcast. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 1994, pp:176-183 [Conf]
Tatsuaki Okamoto, Kazuo Ohta How to Simultaneously Exchange Secrets by General Assumptions. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 1994, pp:184-192 [Conf]
James W. Coyne, Norman C. Kluksdahl ``Mainstreaming'' Automated Information Systems Security Engineering (a case study in security run amok). [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 1994, pp:251-257 [Conf]
Randy Browne An Entropy Conservation Law for Testing the Completeness of Convert Channel Analysis. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 1994, pp:270-281 [Conf]