The SCEAS System
Navigation Menu

Conferences in DBLP

Security Protocols Workshop (spw)
1999 (conf/spw/1999)

  1. Roger M. Needham
    Keynote Address: The Changing Environment. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1999, pp:1-5 [Conf]
  2. E. Stewart Lee
    Composing Security Properties. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1999, pp:6-14 [Conf]
  3. T. Mark A. Lomas
    Auditing against Multiple Policies. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1999, pp:15-20 [Conf]
  4. Ross J. Anderson, Jong-Hyeon Lee
    Jikzi: A New Framework for Secure Publishing. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1999, pp:21-47 [Conf]
  5. Babak Sadighi Firozabadi, Marek J. Sergot
    Power and Permission in Security Systems. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1999, pp:48-59 [Conf]
  6. Bruce Christianson
    Auditing against Impossible Abstractions. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1999, pp:60-64 [Conf]
  7. Dieter Gollmann
    What Is Authentication? [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1999, pp:65-72 [Conf]
  8. Lawrence C. Paulson
    Relatios Between Secrets: The Yahalom Protocol. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1999, pp:73-84 [Conf]
  9. Giampaolo Bella
    Modelling Agents' Knowledge Inductively. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1999, pp:85-94 [Conf]
  10. Wenbo Mao
    Time-Lock Puzzle with Examinable Evidence of Unlocking Time. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1999, pp:95-102 [Conf]
  11. Matt Blaze, John Ioannidis, Angelos D. Keromytis
    Trust Management and Network Layer Security Protocols. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1999, pp:103-118 [Conf]
  12. Francesco Bergadano, Davide Cavagnino, Bruno Crispo
    Issues in Multicast Security. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1999, pp:119-139 [Conf]
  13. Michael Roe
    Performance of Protocols. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1999, pp:140-152 [Conf]
  14. Virgil D. Gligor, Pompiliu Donescu
    Integrity-Aware PCBC Encryption Schemes. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1999, pp:153-171 [Conf]
  15. Frank Stajano, Ross J. Anderson
    The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1999, pp:172-194 [Conf]
  16. Hiroshi Yoshiura, Seiichi Susaki, Yasuhiko Nagai, Tsukasa Saitoh, Hisashi Toyoshima, Ryôichi Sasaki, Satoru Tezuka
    INTERNET-MARKs: Clear, Secure, and Portable Visual Marks for the Cyber Worlds. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1999, pp:195-207 [Conf]
  17. Bruce Christianson, James A. Malcolm, Brian L. Robinson
    Pictures Can't Lie under Oath. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1999, pp:208-218 [Conf]
  18. Bob Morris
    Bob versus Bob - Good Guy/Bad Guy. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1999, pp:219-227 [Conf]
  19. Allan Ahlberg
    Who Knows? [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1999, pp:228- [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002