The SCEAS System
Navigation Menu

Conferences in DBLP

Conference on Computer and Communications Security (CCS) (ccs)
1999 (conf/ccs/1999)

  1. Stefan Axelsson
    The Base-Rate Fallacy and Its Implications for the Difficulty of Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1999, pp:1-7 [Conf]
  2. R. Sekar, Y. Guang, S. Verma, T. Shanbhag
    A High-Performance Network Intrusion Detection System. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1999, pp:8-17 [Conf]
  3. Boaz Barak, Amir Herzberg, Dalit Naor, Eldad Shai
    The Proactive Security Toolkit and Applications. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1999, pp:18-27 [Conf]
  4. Ari Juels, Martin Wattenberg
    A Fuzzy Commitment Scheme. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1999, pp:28-36 [Conf]
  5. Guillaume Poupard, Jacques Stern
    On the Fly Signatures Based on Factoring. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1999, pp:37-45 [Conf]
  6. Ronald Cramer, Victor Shoup
    Signature Schemes Based on the Strong RSA Assumption. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1999, pp:46-51 [Conf]
  7. Andrew W. Appel, Edward W. Felten
    Proof-Carrying Authentication. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1999, pp:52-62 [Conf]
  8. Maurizio Kliban Boyarsky
    Public-Key Cryptography and Password Protocols: The Multi-User Case. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1999, pp:63-72 [Conf]
  9. Fabian Monrose, Michael K. Reiter, Susanne Wetzel
    Password Hardening Based on Keystroke Dynamics. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1999, pp:73-82 [Conf]
  10. Alain J. Mayer, Moti Yung
    Secure Protocol Transformation via "Expansion": From Two-Party to Groups. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1999, pp:83-92 [Conf]
  11. Pankaj Rohatgi
    A Compact and Fast Hybrid Signature Scheme for Multicast Packet Authentication. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1999, pp:93-100 [Conf]
  12. Refik Molva, Alain Pannetrat
    Scalable Multicast Security in Dynamic Groups. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1999, pp:101-112 [Conf]
  13. Dan Boneh, Matthew K. Franklin
    Anonymous Authentication with Subset Queries (extended abstract). [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1999, pp:113-119 [Conf]
  14. Christian Cachin
    Efficient Private Bidding and Auctions with an Oblivious Third Party. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1999, pp:120-127 [Conf]
  15. William Aiello, Aviel D. Rubin, Martin Strauss
    Using Smartcards to Secure a Personalized Gambling Device. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1999, pp:128-137 [Conf]
  16. Giuseppe Ateniese
    Efficient Verifiable Encryption (and Fair Exchange) of Digital Signatures. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1999, pp:138-146 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002