Mathieu Baudet Deciding security of protocols against off-line guessing attacks. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2005, pp:16-25 [Conf]
Peeter Laud Secrecy types for a simulatable cryptographic library. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2005, pp:26-35 [Conf]
Keith Irwin, Ting Yu Preventing attribute information leakage in automated trust negotiation. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2005, pp:36-45 [Conf]
Qiang Huang, David Jao, Helen J. Wang Applications of secure electronic voting to automated privacy-preserving troubleshooting. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2005, pp:68-80 [Conf]
Jonathan Katz, Ji Sun Shin Modeling insider attacks on group key-exchange protocols. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2005, pp:180-189 [Conf]
Boaz Barak, Shai Halevi A model and architecture for pseudo-random generation with applications to /dev/random. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2005, pp:203-212 [Conf]
Zhenkai Liang, R. Sekar Fast and automated generation of attack signatures: a basis for building self-protecting servers. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2005, pp:213-222 [Conf]
Michael F. Ringenburg, Dan Grossman Preventing format-string attacks via automatic and efficient dynamic checking. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2005, pp:354-363 [Conf]
Peter P. Swire Security market: incentives for disclosure of vulnerabilities. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2005, pp:405- [Conf]
Guido Appenzeller Identity-based encryption from algorithm to enterprise deployment. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2005, pp:406- [Conf]
Vance Bjorn Biometrics hit the mainstream: an analysis of security and privacy implications. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2005, pp:407- [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP