The SCEAS System
Navigation Menu

Conferences in DBLP

IEEE Symposium on Security and Privacy (S&P) (sp)
1980 (conf/sp/1980)

  1. Rein Turn
    An Overview of Transborder Data Flow Issues. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1980, pp:3-8 [Conf]
  2. Gerald Kreissig
    A Model to Describe Protection Problems. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1980, pp:9-17 [Conf]
  3. Theodore D. Friedman, Lance J. Hoffman
    Towards a Fail-Safe Approach to Secure Databases. [Citation Graph (1, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1980, pp:18-21 [Conf]
  4. L. Liu
    On Security Flow Analysis in Computer Systems (Preliminary Report). [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1980, pp:22-33 [Conf]
  5. David A. Bonyun
    The Secure Relational Database Management System Kernel: Three Years After. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1980, pp:34-37 [Conf]
  6. Steven P. Reiss
    Practical Data-Swapping: The First Steps. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1980, pp:38-45 [Conf]
  7. S. M. Miranda
    Aspects of Data Security in General-Purpose Data Base Management Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1980, pp:46-58 [Conf]
  8. Reind P. van de Riet, Martin L. Kersten, Anthony I. Wasserman
    A Module Definition Facility for Access Control in Distributed Data Base Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1980, pp:59-66 [Conf]
  9. P. Tucker Withington
    The Trusted Function in Secure Decentralized Processing. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1980, pp:67-82 [Conf]
  10. Martin E. Hellman
    On the Difficulty of Computing Logarithms Over GF(qm). [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1980, pp:83- [Conf]
  11. Gustavus J. Simmons
    Secure Communications in the Presence of Pervasive Deceit. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1980, pp:84-93 [Conf]
  12. Adi Shamir
    The Cryptographic Security of Compact Knapsacks (Preliminary Report). [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1980, pp:94-99 [Conf]
  13. George I. Davida, Richard A. DeMillo, Richard J. Lipton
    Protecting Shared Cryptographic Keys. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1980, pp:100-102 [Conf]
  14. Dorothy E. Denning, Fred B. Schneider
    The Master Key Problem. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1980, pp:103-107 [Conf]
  15. G. R. Blakley
    One Time Pads Are Key Safeguarding Schemes, Not Cryptosystems Fast Key Safeguarding Schemes (Threshold Schemes) Exist. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1980, pp:108-113 [Conf]
  16. P. Barbarino
    Multi-Tiered Approach to System Security. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1980, pp:114-121 [Conf]
  17. Ralph C. Merkle
    Protocols for Public Key Cryptosystems. [Citation Graph (1, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1980, pp:122-134 [Conf]
  18. George I. Davida, Richard A. DeMillo, Richard J. Lipton
    A System Architecture to Support a Verifiably Secure Multilevel Security System. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1980, pp:137-144 [Conf]
  19. Stanley R. Ames Jr., James G. Keeton-Williams
    Demonstrating Security for Trusted Applications on a Security Kernel Base. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1980, pp:145-156 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002