The SCEAS System
Navigation Menu

Conferences in DBLP

Security Protocols Workshop (spw)
2001 (conf/spw/2001)

  1. Roger M. Needham
    Keynote Address: Mobile Computing versus Immobile Security. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2001, pp:1-3 [Conf]
  2. Michael Roe
    Experiences of Mobile IP Security. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2001, pp:4-11 [Conf]
  3. Pekka Nikander
    Denial-of-Service, Address Ownership, and Early Authentication in the IPv6 World. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2001, pp:12-21 [Conf]
  4. Pekka Nikander
    Denial of Service, Address Ownership, and Early Authentication in the IPv6 World (Transcript of Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2001, pp:22-26 [Conf]
  5. William Aiello, Steven M. Bellovin, Matt Blaze, Ran Canetti, John Ioannidis, Angelos D. Keromytis, Omer Reingold
    Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2001, pp:27-39 [Conf]
  6. Matt Blaze
    Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols (Transcript of Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2001, pp:40-48 [Conf]
  7. Geraint Price
    Thwarting Timing Attacks Using ATM Networks. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2001, pp:49-58 [Conf]
  8. Geraint Price
    Thwarting Timing Attacks Using ATM Networks (Transcript of Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2001, pp:59-62 [Conf]
  9. Tuomas Aura, Silja Mäki
    Towards a Survivable Security Architecture for Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2001, pp:63-73 [Conf]
  10. Silja Mäki
    Towards a Survivable Security Architecture for Ad-Hoc Networks (Transcript of Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2001, pp:74-79 [Conf]
  11. Dieter Gollmann
    PIM Security. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2001, pp:80-81 [Conf]
  12. Dieter Gollmann
    PIM Security (Transcript of Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2001, pp:82-86 [Conf]
  13. Bruce Christianson, David Wheeler
    Merkle Puzzles Revisited - Finding Matching Elements Between Lists. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2001, pp:87-90 [Conf]
  14. Bruce Christianson
    Merkle Puzzles Revisited (Transcript of Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2001, pp:91-94 [Conf]
  15. Jan Jürjens
    Encapsulating Rules of Prudent Security Engineering. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2001, pp:95-101 [Conf]
  16. Jan Jürjens
    Encapsulating Rules of Prudent Security Engineering (Transcript of Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2001, pp:102-106 [Conf]
  17. Hiroshi Yoshiura, Kunihiko Miyazaki, Shinji Itoh, Kazuo Takaragi, Ryôichi Sasaki
    A Multi-OS Approach to Trusted Computer Systems. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2001, pp:107-114 [Conf]
  18. Hiroshi Yoshiura
    A Multi-OS Approach to Trusted Computer Systems (Transcript of Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2001, pp:115-118 [Conf]
  19. Giampaolo Bella, Lawrence C. Paulson
    A Proof of Non-repudiation. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2001, pp:119-125 [Conf]
  20. Lawrence C. Paulson
    A Proof of Non-repudiation (Transcript of Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2001, pp:126-133 [Conf]
  21. Babak Sadighi Firozabadi, Marek J. Sergot, Olav L. Bandmann
    Using Authority Certificates to Create Management Structures. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2001, pp:134-145 [Conf]
  22. Babak Sadighi Firozabadi
    Using Attribute Certificates for Creating Management Structures (Transcript of Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2001, pp:146-150 [Conf]
  23. Simon N. Foley
    Trust Management and Whether to Delegate. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2001, pp:151-157 [Conf]
  24. Simon N. Foley
    Trust Management and Whether to Delegate (Transcript of Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2001, pp:158-165 [Conf]
  25. T. Mark A. Lomas
    You Can't Take It with You. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2001, pp:166-169 [Conf]
  26. David Wheeler
    Protocols Using Keys from Faulty Data. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2001, pp:170-179 [Conf]
  27. David Wheeler
    Protocols Using Keys from Faulty Data (Transcript of Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2001, pp:180-187 [Conf]
  28. Virgil D. Gligor, Himanshu Khurana, Radostina K. Koleva, Vijay G. Bharadwaj, John S. Baras
    On the Negotiation of Access Control Policies. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2001, pp:188-201 [Conf]
  29. Virgil D. Gligor
    Negotiation of Access Control Policies (Transcript of Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2001, pp:202-212 [Conf]
  30. Hassen Saïdi
    Intrusion-Tolerant Group Management in Enclaves. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2001, pp:213-216 [Conf]
  31. James A. Malcolm
    Lightweight Authentication in a Mobile Network (Transcript of Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2001, pp:217-220 [Conf]
  32. Peter Drabwell
    Bluetooth Security - Fact or Fiction? (Transcript of Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2001, pp:221-228 [Conf]
  33. Bruce Christianson
    Concluding Discussion: When Does Confidentiality Harm Security? [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2001, pp:229-238 [Conf]
  34. Thucydides
    The Last Word. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2001, pp:239- [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002