Conferences in DBLP
Stelios Karanastasis , Ahmed Patel Security On ATM Networks. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 1999, pp:3-20 [Conf ] Herbert Leitold , Karl C. Posch , Reinhard Posch ISDN Security services. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 1999, pp:21-35 [Conf ] Olivier Paul , Maryline Laurent An Alternative Access Control Architecture for IP over ATM Networks. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 1999, pp:36-52 [Conf ] Yvo Desmedt , Brian King Verifiable Democracy. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 1999, pp:53-70 [Conf ] Markus Jakobsson , Claus-Peter Schnorr Efficient Oblivious Proofs of Correct Exponentiation. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 1999, pp:71-86 [Conf ] Martin Stanek , Daniel Olejar Weaknesses in EHA Authentication and Key Distribution Protocol. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 1999, pp:87-95 [Conf ] Gunnar Jacobson Formal Design of Efficient Authentication and Key-Agreement. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 1999, pp:96-116 [Conf ] Per Kaijser On Authentication, Digital Signatures and Signature Laws. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 1999, pp:117-132 [Conf ] Thumrongrat Amornraksa , David R. B. Burgess , Peter Sweeney Watermarking and Secure Distribution for Encrypted Video. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 1999, pp:131-142 [Conf ] Constantinos Markantonakis , Simeon Xenitellis Implementing a Secure Log File Download Manager for the Java Card. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 1999, pp:143-162 [Conf ] Rolf Oppliger Protecting Key Exchange and Management Protocols Against Resource Clogging Attacks. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 1999, pp:163-175 [Conf ] William A. Adamson , C. J. Antonelli , Kevin Coffman , Patrick Drew McDaniel , Jim Rees Secure Distributed Virtual Conferencing. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 1999, pp:176-190 [Conf ] Thomas Hardjono , Brad Cain PIM -SM Security: Interdomain Issues and Solutions. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 1999, pp:191-208 [Conf ] Markku-Juhani Olavi Saarinen Attacks against the WAP WTLS protocol. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 1999, pp:209-215 [Conf ] Sheng-Bo Xu , Cees Jansen , Henk C. A. van Tilborg A New Authentication Protocol for Portable Communication Systems. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 1999, pp:216-230 [Conf ] Yi Cheng , Arne Norefors Token Based Authentication for Handover Security. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 1999, pp:231-246 [Conf ] Jörg Schwenk How to Security Broadcast a Secret. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 1999, pp:247-257 [Conf ] Markus Jakobsson , Ari Juels Proofs of Work and Bread Pudding Protocols. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 1999, pp:258-272 [Conf ] Takeyuki Uehara , Reihaneh Safavi-Naini Attack on Liu/Farrell/Boyd Arithmetic Coding Encryption Scheme. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 1999, pp:273-290 [Conf ] Wolfgang Platzer Secure Data- Transfer for Web- Based Applications. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 1999, pp:291-302 [Conf ] Paul Ashley , Mark Vandenwauver , Joris Claessens Using SESAME to Secure Web Based Applications on an Intranet. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 1999, pp:303-318 [Conf ]