The SCEAS System
Navigation Menu

Conferences in DBLP

IEEE Symposium on Security and Privacy (S&P) (sp)
1983 (conf/sp/1983)

  1. Billy G. Claybrook
    Using Views in a Multilevel Secure Database Management System. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1983, pp:4-17 [Conf]
  2. Neal R. Wagner
    Fingerprinting. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1983, pp:18-22 [Conf]
  3. Dorothy E. Denning
    The Many-Time Pad: Theme and Variations. [Citation Graph (1, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1983, pp:23-32 [Conf]
  4. Robert R. Jueneman, Stephen M. Matyas, Carl H. Meyer
    Message Authentication with Manipulation Detection Code. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1983, pp:33-54 [Conf]
  5. Subhash C. Kak
    Joint Encryption and Error-Correction Coding. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1983, pp:55-60 [Conf]
  6. Gustavus J. Simmons
    Verification of Treaty Compliance Revisited. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1983, pp:61-66 [Conf]
  7. Marvin C. Wunderlich
    Recent Advances in the Design and Implementation of Large Integer Factorization Algorithms. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1983, pp:67-71 [Conf]
  8. Stephen J. MacKinnon, Selim G. Akl
    New Key Generation Algorithms for Multilevel Security. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1983, pp:72-78 [Conf]
  9. K. A. Omar, David L. Wells
    Modified Architecture for the Sub-Keys Model. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1983, pp:79-88 [Conf]
  10. Roger R. Schell
    Evaluating Security Properties of Computer Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1983, pp:89-95 [Conf]
  11. Paul Woodie
    Security Enhancement through Product Evaluation. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1983, pp:96-101 [Conf]
  12. James P. Anderson
    An Approach to Indentification of Minimum TCB Requirements for Various Threat/Risk Environments. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1983, pp:102-106 [Conf]
  13. Bahaa W. Fam, Jonathan K. Millen
    The Channel Assignment Problem. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1983, pp:107-112 [Conf]
  14. Thomas H. Hinke, Jose Althouse, Richard A. Kemmerer
    SDC Secure Release Terminal Project. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1983, pp:113-119 [Conf]
  15. Thomas A. Berson, Richard J. Feiertag, R. Kenneth Bauer
    Processor-per-Domain Guard Architecture. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1983, pp:120- [Conf]
  16. D. Barnes
    The Provision of Security for User Data on Packet Switched Networks. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1983, pp:121-126 [Conf]
  17. John M. Rushby, Brian Randell
    A Distributed Secure System. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1983, pp:127-135 [Conf]
  18. Whitfield Diffie
    Securing Networks: End-to-End Encrpytion vs. Link Encryption and Trusted Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1983, pp:136-138 [Conf]
  19. Virgil D. Gligor
    A Note on the Denial-of-Service Problem. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1983, pp:139-149 [Conf]
  20. Brian Marick
    The VERUS Design Verification System. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1983, pp:150-160 [Conf]
  21. D. E. Bell
    Secure Computer Systems: A Retrospective. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1983, pp:161-162 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002