The SCEAS System
Navigation Menu

Conferences in DBLP

Communications and Multimedia Security (cms)
1999 (conf/cms/1999)

  1. Stelios Karanastasis, Ahmed Patel
    Security On ATM Networks. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 1999, pp:3-20 [Conf]
  2. Herbert Leitold, Karl C. Posch, Reinhard Posch
    ISDN Security services. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 1999, pp:21-35 [Conf]
  3. Olivier Paul, Maryline Laurent
    An Alternative Access Control Architecture for IP over ATM Networks. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 1999, pp:36-52 [Conf]
  4. Yvo Desmedt, Brian King
    Verifiable Democracy. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 1999, pp:53-70 [Conf]
  5. Markus Jakobsson, Claus-Peter Schnorr
    Efficient Oblivious Proofs of Correct Exponentiation. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 1999, pp:71-86 [Conf]
  6. Martin Stanek, Daniel Olejar
    Weaknesses in EHA Authentication and Key Distribution Protocol. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 1999, pp:87-95 [Conf]
  7. Gunnar Jacobson
    Formal Design of Efficient Authentication and Key-Agreement. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 1999, pp:96-116 [Conf]
  8. Per Kaijser
    On Authentication, Digital Signatures and Signature Laws. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 1999, pp:117-132 [Conf]
  9. Thumrongrat Amornraksa, David R. B. Burgess, Peter Sweeney
    Watermarking and Secure Distribution for Encrypted Video. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 1999, pp:131-142 [Conf]
  10. Constantinos Markantonakis, Simeon Xenitellis
    Implementing a Secure Log File Download Manager for the Java Card. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 1999, pp:143-162 [Conf]
  11. Rolf Oppliger
    Protecting Key Exchange and Management Protocols Against Resource Clogging Attacks. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 1999, pp:163-175 [Conf]
  12. William A. Adamson, C. J. Antonelli, Kevin Coffman, Patrick Drew McDaniel, Jim Rees
    Secure Distributed Virtual Conferencing. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 1999, pp:176-190 [Conf]
  13. Thomas Hardjono, Brad Cain
    PIM -SM Security: Interdomain Issues and Solutions. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 1999, pp:191-208 [Conf]
  14. Markku-Juhani Olavi Saarinen
    Attacks against the WAP WTLS protocol. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 1999, pp:209-215 [Conf]
  15. Sheng-Bo Xu, Cees Jansen, Henk C. A. van Tilborg
    A New Authentication Protocol for Portable Communication Systems. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 1999, pp:216-230 [Conf]
  16. Yi Cheng, Arne Norefors
    Token Based Authentication for Handover Security. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 1999, pp:231-246 [Conf]
  17. Jörg Schwenk
    How to Security Broadcast a Secret. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 1999, pp:247-257 [Conf]
  18. Markus Jakobsson, Ari Juels
    Proofs of Work and Bread Pudding Protocols. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 1999, pp:258-272 [Conf]
  19. Takeyuki Uehara, Reihaneh Safavi-Naini
    Attack on Liu/Farrell/Boyd Arithmetic Coding Encryption Scheme. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 1999, pp:273-290 [Conf]
  20. Wolfgang Platzer
    Secure Data- Transfer for Web- Based Applications. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 1999, pp:291-302 [Conf]
  21. Paul Ashley, Mark Vandenwauver, Joris Claessens
    Using SESAME to Secure Web Based Applications on an Intranet. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 1999, pp:303-318 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002