Conferences in DBLP
Niklas Frykholm , Ari Juels Error-tolerant password recovery. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2001, pp:1-9 [Conf ] Philip D. MacKenzie , Michael K. Reiter Delegation of cryptographic servers for capture-resilient devices. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2001, pp:10-19 [Conf ] David Naccache , David Pointcheval , Jacques Stern Twin signatures: an alternative to the hash-and-sign paradigm. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2001, pp:20-27 [Conf ] Adrian Perrig The BiBa one-time signature and broadcast authentication protocol. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2001, pp:28-37 [Conf ] Duminda Wijesekera , Sushil Jajodia Policy algebras for access control: the propositional case. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2001, pp:38-47 [Conf ] Vijayalakshmi Atluri , Soon Ae Chun , Pietro Mazzoleni A Chinese wall security model for decentralized workflow systems. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2001, pp:48-57 [Conf ] Gustaf Neumann , Mark Strembeck Design and implementation of a flexible RBAC-service in an object-oriented scripting language. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2001, pp:58-67 [Conf ] Naoya Nitta , Yoshiaki Takata , Hiroyuki Seki An efficient security verification method for programs with stack inspection. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2001, pp:68-77 [Conf ] Alan Harbitter , Daniel A. Menascé The performance of public key-enabled kerberos authentication in mobile computing applications. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2001, pp:78-85 [Conf ] Giuseppe Ateniese , Stefan Mangard A new approach to DNS security (DNSSEC). [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2001, pp:86-95 [Conf ] Federico Crazzolara , Glynn Winskel Events in security protocols. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2001, pp:96-105 [Conf ] Joseph Y. Halpern , Riccardo Pucella On the relationship between strand spaces and multi-agent systems. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2001, pp:106-115 [Conf ] C. Andrew Neff A verifiable secret shuffle and its application to e-voting. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2001, pp:116-125 [Conf ] Marc Waldman , David Mazières Tangler: a censorship-resistant publishing system based on document entanglements. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2001, pp:126-135 [Conf ] Premkumar T. Devanbu , Michael Gertz , April Kwong , Charles U. Martel , Glen Nuckolls , Stuart G. Stubblebine Flexible authentication of XML documents. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2001, pp:136-145 [Conf ] Ting Yu , Marianne Winslett , Kent E. Seamons Interoperable strategies in automated trust negotiation. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2001, pp:146-155 [Conf ] Ninghui Li , William H. Winsborough , John C. Mitchell Distributed credential chain discovery in trust management: extended abstract. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2001, pp:156-165 [Conf ] Jonathan K. Millen , Vitaly Shmatikov Constraint solving for bounded-process cryptographic protocol analysis. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2001, pp:166-175 [Conf ] Rohit Chadha , Max I. Kanovich , Andre Scedrov Inductive methods and contract-signing protocols. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2001, pp:176-185 [Conf ] Joshua D. Guttman , F. Javier Thayer , Lenore D. Zuck The faithfulness of abstract protocol analysis: message authentication. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2001, pp:186-195 [Conf ] Phillip Rogaway , Mihir Bellare , John Black , Ted Krovetz OCB: a block-cipher mode of operation for efficient authenticated encryption. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2001, pp:196-205 [Conf ] Dario Catalano , Rosario Gennaro , Nick Howgrave-Graham , Phong Q. Nguyen Paillier's cryptosystem revisited. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2001, pp:206-214 [Conf ] Stuart Haber , Benny Pinkas Securely combining public-key cryptosystems. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2001, pp:215-224 [Conf ] Dawn Xiaodong Song Practical forward secure group signature schemes. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2001, pp:225-234 [Conf ] Catherine Meadows , Paul F. Syverson Formalizing GDOI group key management requirements in NPATRL. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2001, pp:235-244 [Conf ] Silvio Micali , Kazuo Ohta , Leonid Reyzin Accountable-subgroup multisignatures: extended abstract. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2001, pp:245-254 [Conf ] Emmanuel Bresson , Olivier Chevassut , David Pointcheval , Jean-Jacques Quisquater Provably authenticated group Diffie-Hellman key exchange. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2001, pp:255-264 [Conf ]