Conferences in DBLP
Ross J. Anderson , Václav Matyás Jr. , Fabien A. P. Petitcolas , Iain E. Buchan , Rudolf Hanka Secure Books: Protecting the Distribution of Knowledge. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 1997, pp:1-11 [Conf ] Michael G. Reed , Paul F. Syverson , David M. Goldschlag Protocols Using Anonymous Connections: Mobile Applications. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 1997, pp:13-23 [Conf ] Tatsuaki Okamoto Receipt-Free Electronic Voting Schemes for Large Scale Elections. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 1997, pp:25-35 [Conf ] Eduardo Solana , Jürgen Harms Flexible Internet Secure Transactions Based on Collaborative Domains. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 1997, pp:37-51 [Conf ] Bruno Crispo How to Build Evidence in a Public-Key Infrastructure for Multi-domain Environments. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 1997, pp:53-65 [Conf ] Holger Petersen , Markus Michels On Signature Schemes with Threshold Verification Detecting Malicious Verifiers. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 1997, pp:67-78 [Conf ] Stefan Lucks Open Key Exchange: How to Defeat Dictionary Attacks Without Encrypting Public Keys. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 1997, pp:79-90 [Conf ] John Kelsey , Bruce Schneier , David Wagner Protocol Interactions and the Chosen Protocol Attack. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 1997, pp:91-104 [Conf ] Bruce Christianson , James A. Malcolm Binding Bit Patterns to Real World Entities. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 1997, pp:105-113 [Conf ] Feng Bao , Robert H. Deng , Yongfei Han , Albert B. Jeng , A. Desai Narasimhalu , Teow-Hin Ngair Breaking Public Key Cryptosystems on Tamper Resistant Devices in the Presence of Transient Faults. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 1997, pp:115-124 [Conf ] Ross J. Anderson , Markus G. Kuhn Low Cost Attacks on Tamper Resistant Devices. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 1997, pp:125-136 [Conf ] Simon Blake-Wilson , Alfred Menezes Entity Authentication and Authenticated Key Transport Protocols Employing Asymmetric Techniques. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 1997, pp:137-158 [Conf ] Sigrid Gürgens SG Logic- A Formal Analysis Technique for Authentication Protocols. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 1997, pp:159-176 [Conf ] Holger Petersen How to Convert any Digital Signature Scheme into a Group Signature Scheme. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 1997, pp:177-190 [Conf ] Tatsuaki Okamoto Threshold Key-Recovery Systems for RSA. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 1997, pp:191-200 [Conf ] Klaus Kiefer A Weakness of the Menezes-Vanstone Cryptosystem. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 1997, pp:201-206 [Conf ] Pascal Paillier On Ideal Non-perfect Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 1997, pp:207-216 [Conf ]