The SCEAS System
Navigation Menu

Conferences in DBLP

Conference on Computer and Communications Security (CCS) (ccs)
1997 (conf/ccs/1997)

  1. Matthew K. Franklin, Michael K. Reiter
    Fair Exchange with a Semi-Trusted Third Party (extended abstract). [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1997, pp:1-5 [Conf]
  2. N. Asokan, Matthias Schunter, Michael Waidner
    Optimistic Protocols for Fair Exchange. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1997, pp:7-17 [Conf]
  3. Drew Dean
    The Security of Static Typing with Dynamic Linking. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1997, pp:18-27 [Conf]
  4. Stuart Haber, W. Scott Stornetta
    Secure Names for Bit-Strings. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1997, pp:28-35 [Conf]
  5. Martín Abadi, Andrew D. Gordon
    A Calculus for Cryptographic Protocols: The Spi Calculus. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1997, pp:36-47 [Conf]
  6. Fabian Monrose, Aviel D. Rubin
    Authentication via Keystroke Dynamics. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1997, pp:48-56 [Conf]
  7. Michael K. Reiter, Stuart G. Stubblebine
    Path Independence for Authentication in Large-Scale Systems. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1997, pp:57-66 [Conf]
  8. Francesco Bergadano, Bruno Crispo, Giancarlo Ruffo
    Proactive Password Checking with Decision Trees. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1997, pp:67-77 [Conf]
  9. Mihir Bellare, Shafi Goldwasser
    Verifiable Partial Key Escrow. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1997, pp:78-91 [Conf]
  10. David Pointcheval, Jacques Stern
    New Blind Signatures Equivalent to Factorization (extended abstract). [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1997, pp:92-99 [Conf]
  11. Amir Herzberg, Markus Jakobsson, Stanislaw Jarecki, Hugo Krawczyk, Moti Yung
    Proactive Public Key and Signature Systems. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1997, pp:100-110 [Conf]
  12. Robert H. Deng, Yongfei Han, Albert B. Jeng, Teow-Hin Ngair
    A New On-Line Cash Check Scheme. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1997, pp:111-116 [Conf]
  13. John Kelsey, Bruce Schneier
    Conditional Purchase Orders. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1997, pp:117-124 [Conf]
  14. Simon N. Foley
    The Specification and Implementation of ``Commercial'' Security Requirements Including Dynamic Segregation of Duties. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1997, pp:125-134 [Conf]
  15. Marc Joye, Jean-Jacques Quisquater
    On the Importance of Securing Your Bins: The Garbage-man-in-the-middle Attack. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1997, pp:135-141 [Conf]
  16. Jacques Patarin
    Improved Security Bounds for Pseudorandom Permutations. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1997, pp:142-150 [Conf]
  17. Birgit Pfitzmann, Michael Waidner
    Asymmetric Fingerprinting for Larger Collusions. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1997, pp:151-160 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002