L. Liu On Security Flow Analysis in Computer Systems (Preliminary Report). [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1980, pp:22-33 [Conf]
David A. Bonyun The Secure Relational Database Management System Kernel: Three Years After. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1980, pp:34-37 [Conf]
Steven P. Reiss Practical Data-Swapping: The First Steps. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1980, pp:38-45 [Conf]
S. M. Miranda Aspects of Data Security in General-Purpose Data Base Management Systems. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1980, pp:46-58 [Conf]
P. Tucker Withington The Trusted Function in Secure Decentralized Processing. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1980, pp:67-82 [Conf]
Martin E. Hellman On the Difficulty of Computing Logarithms Over GF(qm). [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1980, pp:83- [Conf]
Gustavus J. Simmons Secure Communications in the Presence of Pervasive Deceit. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1980, pp:84-93 [Conf]
Adi Shamir The Cryptographic Security of Compact Knapsacks (Preliminary Report). [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1980, pp:94-99 [Conf]
G. R. Blakley One Time Pads Are Key Safeguarding Schemes, Not Cryptosystems Fast Key Safeguarding Schemes (Threshold Schemes) Exist. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1980, pp:108-113 [Conf]
P. Barbarino Multi-Tiered Approach to System Security. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1980, pp:114-121 [Conf]
Ralph C. Merkle Protocols for Public Key Cryptosystems. [Citation Graph (1, 0)][DBLP] IEEE Symposium on Security and Privacy, 1980, pp:122-134 [Conf]