The SCEAS System
Navigation Menu

Conferences in DBLP

Conference on Computer and Communications Security (CCS) (ccs)
2001 (conf/ccs/2001)

  1. Niklas Frykholm, Ari Juels
    Error-tolerant password recovery. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2001, pp:1-9 [Conf]
  2. Philip D. MacKenzie, Michael K. Reiter
    Delegation of cryptographic servers for capture-resilient devices. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2001, pp:10-19 [Conf]
  3. David Naccache, David Pointcheval, Jacques Stern
    Twin signatures: an alternative to the hash-and-sign paradigm. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2001, pp:20-27 [Conf]
  4. Adrian Perrig
    The BiBa one-time signature and broadcast authentication protocol. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2001, pp:28-37 [Conf]
  5. Duminda Wijesekera, Sushil Jajodia
    Policy algebras for access control: the propositional case. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2001, pp:38-47 [Conf]
  6. Vijayalakshmi Atluri, Soon Ae Chun, Pietro Mazzoleni
    A Chinese wall security model for decentralized workflow systems. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2001, pp:48-57 [Conf]
  7. Gustaf Neumann, Mark Strembeck
    Design and implementation of a flexible RBAC-service in an object-oriented scripting language. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2001, pp:58-67 [Conf]
  8. Naoya Nitta, Yoshiaki Takata, Hiroyuki Seki
    An efficient security verification method for programs with stack inspection. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2001, pp:68-77 [Conf]
  9. Alan Harbitter, Daniel A. Menascé
    The performance of public key-enabled kerberos authentication in mobile computing applications. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2001, pp:78-85 [Conf]
  10. Giuseppe Ateniese, Stefan Mangard
    A new approach to DNS security (DNSSEC). [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2001, pp:86-95 [Conf]
  11. Federico Crazzolara, Glynn Winskel
    Events in security protocols. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2001, pp:96-105 [Conf]
  12. Joseph Y. Halpern, Riccardo Pucella
    On the relationship between strand spaces and multi-agent systems. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2001, pp:106-115 [Conf]
  13. C. Andrew Neff
    A verifiable secret shuffle and its application to e-voting. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2001, pp:116-125 [Conf]
  14. Marc Waldman, David Mazières
    Tangler: a censorship-resistant publishing system based on document entanglements. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2001, pp:126-135 [Conf]
  15. Premkumar T. Devanbu, Michael Gertz, April Kwong, Charles U. Martel, Glen Nuckolls, Stuart G. Stubblebine
    Flexible authentication of XML documents. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2001, pp:136-145 [Conf]
  16. Ting Yu, Marianne Winslett, Kent E. Seamons
    Interoperable strategies in automated trust negotiation. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2001, pp:146-155 [Conf]
  17. Ninghui Li, William H. Winsborough, John C. Mitchell
    Distributed credential chain discovery in trust management: extended abstract. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2001, pp:156-165 [Conf]
  18. Jonathan K. Millen, Vitaly Shmatikov
    Constraint solving for bounded-process cryptographic protocol analysis. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2001, pp:166-175 [Conf]
  19. Rohit Chadha, Max I. Kanovich, Andre Scedrov
    Inductive methods and contract-signing protocols. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2001, pp:176-185 [Conf]
  20. Joshua D. Guttman, F. Javier Thayer, Lenore D. Zuck
    The faithfulness of abstract protocol analysis: message authentication. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2001, pp:186-195 [Conf]
  21. Phillip Rogaway, Mihir Bellare, John Black, Ted Krovetz
    OCB: a block-cipher mode of operation for efficient authenticated encryption. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2001, pp:196-205 [Conf]
  22. Dario Catalano, Rosario Gennaro, Nick Howgrave-Graham, Phong Q. Nguyen
    Paillier's cryptosystem revisited. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2001, pp:206-214 [Conf]
  23. Stuart Haber, Benny Pinkas
    Securely combining public-key cryptosystems. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2001, pp:215-224 [Conf]
  24. Dawn Xiaodong Song
    Practical forward secure group signature schemes. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2001, pp:225-234 [Conf]
  25. Catherine Meadows, Paul F. Syverson
    Formalizing GDOI group key management requirements in NPATRL. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2001, pp:235-244 [Conf]
  26. Silvio Micali, Kazuo Ohta, Leonid Reyzin
    Accountable-subgroup multisignatures: extended abstract. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2001, pp:245-254 [Conf]
  27. Emmanuel Bresson, Olivier Chevassut, David Pointcheval, Jean-Jacques Quisquater
    Provably authenticated group Diffie-Hellman key exchange. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2001, pp:255-264 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002