|
Conferences in DBLP
- Roger M. Needham
Keynote Address: The Changing Environment. [Citation Graph (0, 0)][DBLP] Security Protocols Workshop, 1999, pp:1-5 [Conf]
- E. Stewart Lee
Composing Security Properties. [Citation Graph (0, 0)][DBLP] Security Protocols Workshop, 1999, pp:6-14 [Conf]
- T. Mark A. Lomas
Auditing against Multiple Policies. [Citation Graph (0, 0)][DBLP] Security Protocols Workshop, 1999, pp:15-20 [Conf]
- Ross J. Anderson, Jong-Hyeon Lee
Jikzi: A New Framework for Secure Publishing. [Citation Graph (0, 0)][DBLP] Security Protocols Workshop, 1999, pp:21-47 [Conf]
- Babak Sadighi Firozabadi, Marek J. Sergot
Power and Permission in Security Systems. [Citation Graph (0, 0)][DBLP] Security Protocols Workshop, 1999, pp:48-59 [Conf]
- Bruce Christianson
Auditing against Impossible Abstractions. [Citation Graph (0, 0)][DBLP] Security Protocols Workshop, 1999, pp:60-64 [Conf]
- Dieter Gollmann
What Is Authentication? [Citation Graph (0, 0)][DBLP] Security Protocols Workshop, 1999, pp:65-72 [Conf]
- Lawrence C. Paulson
Relatios Between Secrets: The Yahalom Protocol. [Citation Graph (0, 0)][DBLP] Security Protocols Workshop, 1999, pp:73-84 [Conf]
- Giampaolo Bella
Modelling Agents' Knowledge Inductively. [Citation Graph (0, 0)][DBLP] Security Protocols Workshop, 1999, pp:85-94 [Conf]
- Wenbo Mao
Time-Lock Puzzle with Examinable Evidence of Unlocking Time. [Citation Graph (0, 0)][DBLP] Security Protocols Workshop, 1999, pp:95-102 [Conf]
- Matt Blaze, John Ioannidis, Angelos D. Keromytis
Trust Management and Network Layer Security Protocols. [Citation Graph (0, 0)][DBLP] Security Protocols Workshop, 1999, pp:103-118 [Conf]
- Francesco Bergadano, Davide Cavagnino, Bruno Crispo
Issues in Multicast Security. [Citation Graph (0, 0)][DBLP] Security Protocols Workshop, 1999, pp:119-139 [Conf]
- Michael Roe
Performance of Protocols. [Citation Graph (0, 0)][DBLP] Security Protocols Workshop, 1999, pp:140-152 [Conf]
- Virgil D. Gligor, Pompiliu Donescu
Integrity-Aware PCBC Encryption Schemes. [Citation Graph (0, 0)][DBLP] Security Protocols Workshop, 1999, pp:153-171 [Conf]
- Frank Stajano, Ross J. Anderson
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks. [Citation Graph (0, 0)][DBLP] Security Protocols Workshop, 1999, pp:172-194 [Conf]
- Hiroshi Yoshiura, Seiichi Susaki, Yasuhiko Nagai, Tsukasa Saitoh, Hisashi Toyoshima, Ryôichi Sasaki, Satoru Tezuka
INTERNET-MARKs: Clear, Secure, and Portable Visual Marks for the Cyber Worlds. [Citation Graph (0, 0)][DBLP] Security Protocols Workshop, 1999, pp:195-207 [Conf]
- Bruce Christianson, James A. Malcolm, Brian L. Robinson
Pictures Can't Lie under Oath. [Citation Graph (0, 0)][DBLP] Security Protocols Workshop, 1999, pp:208-218 [Conf]
- Bob Morris
Bob versus Bob - Good Guy/Bad Guy. [Citation Graph (0, 0)][DBLP] Security Protocols Workshop, 1999, pp:219-227 [Conf]
- Allan Ahlberg
Who Knows? [Citation Graph (0, 0)][DBLP] Security Protocols Workshop, 1999, pp:228- [Conf]
|