Tadayoshi Kohno Attacking and repairing the winZip encryption scheme. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2004, pp:72-81 [Conf]
Xavier Boyen Reusable cryptographic fuzzy extractors. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2004, pp:82-91 [Conf]
David Wagner Cryptanalysis of a provably secure CRT-RSA algorithm. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2004, pp:92-97 [Conf]
Adam J. O'Donnell, Harish Sethu On achieving software diversity for improved network security using distributed coloring algorithms. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2004, pp:121-131 [Conf]
Shouhuai Xu, Moti Yung k-anonymous secret handshakes with reusable credentials. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2004, pp:158-167 [Conf]
Dan Boneh, Hovav Shacham Group signatures with verifier-local revocation. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2004, pp:168-177 [Conf]
David Molnar, David Wagner Privacy and security in library RFID: issues, practices, and architectures. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2004, pp:210-219 [Conf]
XiaoFeng Wang, Michael K. Reiter Mitigating bandwidth-exhaustion attacks using congestion puzzles. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2004, pp:257-267 [Conf]
Stéphanie Delaune, Florent Jacquemard A decision procedure for the verification of security protocols with explicit destructors. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2004, pp:278-287 [Conf]
Hao Chen, Jonathan S. Shapiro Using build-integrated static checking to preserve correctness invariants. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2004, pp:288-297 [Conf]