Stefan Axelsson The Base-Rate Fallacy and Its Implications for the Difficulty of Intrusion Detection. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 1999, pp:1-7 [Conf]
Ronald Cramer, Victor Shoup Signature Schemes Based on the Strong RSA Assumption. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 1999, pp:46-51 [Conf]
Alain J. Mayer, Moti Yung Secure Protocol Transformation via "Expansion": From Two-Party to Groups. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 1999, pp:83-92 [Conf]
Pankaj Rohatgi A Compact and Fast Hybrid Signature Scheme for Multicast Packet Authentication. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 1999, pp:93-100 [Conf]
Dan Boneh, Matthew K. Franklin Anonymous Authentication with Subset Queries (extended abstract). [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 1999, pp:113-119 [Conf]
Christian Cachin Efficient Private Bidding and Auctions with an Oblivious Third Party. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 1999, pp:120-127 [Conf]
Giuseppe Ateniese Efficient Verifiable Encryption (and Fair Exchange) of Digital Signatures. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 1999, pp:138-146 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP