The SCEAS System
Navigation Menu

Conferences in DBLP

Security Protocols Workshop (spw)
1997 (conf/spw/1997)

  1. Ross J. Anderson, Václav Matyás Jr., Fabien A. P. Petitcolas, Iain E. Buchan, Rudolf Hanka
    Secure Books: Protecting the Distribution of Knowledge. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1997, pp:1-11 [Conf]
  2. Michael G. Reed, Paul F. Syverson, David M. Goldschlag
    Protocols Using Anonymous Connections: Mobile Applications. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1997, pp:13-23 [Conf]
  3. Tatsuaki Okamoto
    Receipt-Free Electronic Voting Schemes for Large Scale Elections. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1997, pp:25-35 [Conf]
  4. Eduardo Solana, Jürgen Harms
    Flexible Internet Secure Transactions Based on Collaborative Domains. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1997, pp:37-51 [Conf]
  5. Bruno Crispo
    How to Build Evidence in a Public-Key Infrastructure for Multi-domain Environments. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1997, pp:53-65 [Conf]
  6. Holger Petersen, Markus Michels
    On Signature Schemes with Threshold Verification Detecting Malicious Verifiers. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1997, pp:67-78 [Conf]
  7. Stefan Lucks
    Open Key Exchange: How to Defeat Dictionary Attacks Without Encrypting Public Keys. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1997, pp:79-90 [Conf]
  8. John Kelsey, Bruce Schneier, David Wagner
    Protocol Interactions and the Chosen Protocol Attack. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1997, pp:91-104 [Conf]
  9. Bruce Christianson, James A. Malcolm
    Binding Bit Patterns to Real World Entities. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1997, pp:105-113 [Conf]
  10. Feng Bao, Robert H. Deng, Yongfei Han, Albert B. Jeng, A. Desai Narasimhalu, Teow-Hin Ngair
    Breaking Public Key Cryptosystems on Tamper Resistant Devices in the Presence of Transient Faults. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1997, pp:115-124 [Conf]
  11. Ross J. Anderson, Markus G. Kuhn
    Low Cost Attacks on Tamper Resistant Devices. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1997, pp:125-136 [Conf]
  12. Simon Blake-Wilson, Alfred Menezes
    Entity Authentication and Authenticated Key Transport Protocols Employing Asymmetric Techniques. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1997, pp:137-158 [Conf]
  13. Sigrid Gürgens
    SG Logic- A Formal Analysis Technique for Authentication Protocols. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1997, pp:159-176 [Conf]
  14. Holger Petersen
    How to Convert any Digital Signature Scheme into a Group Signature Scheme. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1997, pp:177-190 [Conf]
  15. Tatsuaki Okamoto
    Threshold Key-Recovery Systems for RSA. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1997, pp:191-200 [Conf]
  16. Klaus Kiefer
    A Weakness of the Menezes-Vanstone Cryptosystem. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1997, pp:201-206 [Conf]
  17. Pascal Paillier
    On Ideal Non-perfect Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1997, pp:207-216 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002