The SCEAS System
Navigation Menu

Conferences in DBLP

Conference on Computer and Communications Security (CCS) (ccs)
1996 (conf/ccs/1996)

  1. Vipin Samar
    Unified Login with Pluggable Authentication Modules (PAM). [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1996, pp:1-10 [Conf]
  2. Burkhard Wiegel
    Secure External References in Multimedia Email Messages. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1996, pp:11-18 [Conf]
  3. Shaw-Cheng Chuang
    Securing ATM Networks. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1996, pp:19-30 [Conf]
  4. Michael Steiner, Gene Tsudik, Michael Waidner
    Diffie-Hellman Key Distribution Extended to Group Communication. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1996, pp:31-37 [Conf]
  5. Michael K. Reiter, Matthew K. Franklin, John B. Lacy, Rebecca N. Wright
    The Omega Key Management Service. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1996, pp:38-47 [Conf]
  6. Masahiro Mambo, Keisuke Usuda, Eiji Okamoto
    Proxy Signatures for Delegating Signing Operation. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1996, pp:48-57 [Conf]
  7. David M'Raïhi, David Naccache
    Batch Exponentiation: A Fast DLP-Based Signature Generation Strategy. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1996, pp:58-61 [Conf]
  8. Rynson W. H. Lau, Kwok-Yan Lam, Siu Leung Chung
    The Failure of Anti-Hacking Legislation: A Hong Kong Perspective. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1996, pp:62-67 [Conf]
  9. Tsutomu Matsumoto
    Human-Computer Cryptography: An Attempt. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1996, pp:68-75 [Conf]
  10. Markus Jakobsson, Moti Yung
    Revokable and Versatile Electronic Money (extended abstract). [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1996, pp:76-87 [Conf]
  11. Jan Camenisch, Jean-Marc Piveteau, Markus Stadler
    An Efficient Fair Payment System. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1996, pp:88-94 [Conf]
  12. Stuart G. Stubblebine, Rebecca N. Wright
    An Authentication Logic Supporting Synchronization, Revocation, and Recency. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1996, pp:95-105 [Conf]
  13. Dominique Bolignano
    An Approach to the Formal Verification of Cryptographic Protocols. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1996, pp:106-118 [Conf]
  14. Indrajit Ray, Elisa Bertino, Sushil Jajodia, Luigi V. Mancini
    An Advanced Commit Protocol for MLS Distributed Database Systems. [Citation Graph (1, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1996, pp:119-128 [Conf]
  15. David M. Goldschlag
    Several Secure Store and Forward Devices. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1996, pp:129-137 [Conf]
  16. Serge Vaudenay
    An Experiment on DES Statistical Cryptanalysis. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1996, pp:139-147 [Conf]
  17. Markus Michels, Holger Petersen, Patrick Horster
    Breaking and Repairing a Convertible Undeniable Signature Scheme. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1996, pp:148-152 [Conf]
  18. Hung-Min Sun, Shiuh-Pyng Shieh
    Cryptanalysis of Private-Key Encryption Schemes Based on Burst-Error-Correcting Codes. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1996, pp:153-156 [Conf]
  19. Moni Naor, Avishai Wool
    Access Control and Signatures via Quorum Secret Sharing. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1996, pp:157-168 [Conf]
  20. Elisa Bertino, Sushil Jajodia, Pierangela Samarati
    A Non-Timestamped Authorization Model for Data Management Systems. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1996, pp:169-178 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002