The SCEAS System
Navigation Menu

Conferences in DBLP

Security Protocols Workshop (spw)
2000 (conf/spw/2000)

  1. Roger M. Needham
    Keynote Address: Security Protocols and the Swiss Army Knife (Transcript of Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2000, pp:1-4 [Conf]
  2. Dieter Gollmann
    Mergers and Principals. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2000, pp:5-13 [Conf]
  3. Dieter Gollmann
    Mergers and Principals (Transcript of Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2000, pp:14-19 [Conf]
  4. Michael Roe
    Authentication and Naming (Transcript of Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2000, pp:20-23 [Conf]
  5. Pekka Nikander, Kristiina Karvonen
    Users and Trust in Cyberspace. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2000, pp:24-35 [Conf]
  6. Pekka Nikander
    Users and Trust in Cyberspace (Transcript of Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2000, pp:36-42 [Conf]
  7. Peter Landrock
    Interactive Identification Protocols (Transcript of Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2000, pp:43-48 [Conf]
  8. Peter Y. A. Ryan
    Open Questions (Transcript of Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2000, pp:49-53 [Conf]
  9. Matt Blaze
    Looking on the Bright Side of Black-Box Cryptography (Transcript of Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2000, pp:54-61 [Conf]
  10. Michael Roe, Ross J. Anderson, William S. Harbison, T. Mark A. Lomas
    Government Access to Keys - Panel Discussion. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2000, pp:62-73 [Conf]
  11. Giampaolo Bella, Fabio Massacci, Lawrence C. Paulson, Piero Tramontano
    Making Sense of Specifications: The Formalization of SET. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2000, pp:74-81 [Conf]
  12. Lawrence C. Paulson
    Making Sense of Specifications: The Formalization of SET (Transcript of Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2000, pp:82-86 [Conf]
  13. Giampaolo Bella
    Lack of Explicitness Strikes Back. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2000, pp:87-93 [Conf]
  14. Giampaolo Bella
    Lack of Explicitness Strikes Back (Transcript of Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2000, pp:94-99 [Conf]
  15. Himanshu Khurana, Virgil D. Gligor
    Review and Revocation of Access Privileges Distributed with PKI Certificates. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2000, pp:100-112 [Conf]
  16. Virgil D. Gligor
    Review and Revocation of Access Privileges Distributed with PKI Certificates (Transcript of Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2000, pp:113-124 [Conf]
  17. Ross J. Anderson
    The Correctness of Crypto Transaction Sets. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2000, pp:125-127 [Conf]
  18. Ross J. Anderson
    The Correctness of Crypto Transaction Sets (Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2000, pp:128-141 [Conf]
  19. John Ioannidis
    Micro-management of Risk in a Trust-Based Billing System (Transcript of Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2000, pp:142-154 [Conf]
  20. Geraint Price
    Broadening the Scope of Fault Tolerance within Secure Services. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2000, pp:155-164 [Conf]
  21. Geraint Price
    Broadening the Scope of Fault Tolerance within Secure Services (Transcript of Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2000, pp:165-169 [Conf]
  22. Tuomas Aura, Pekka Nikander, Jussipekka Leiwo
    DOS-Resistant Authentication with Client Puzzles. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2000, pp:170-177 [Conf]
  23. Tuomas Aura
    DOS-Resistant Authentication with Client Puzzles (Transcript of Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2000, pp:178-181 [Conf]
  24. Bruce Christianson, Bruno Crispo, James A. Malcolm
    Public-Key Crypto-systems Using Symmetric-Key Crypto-algorithms. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2000, pp:182-183 [Conf]
  25. Bruce Christianson
    Public-Key Crypto-systems Using Symmetric-Key Crypto-algorithms (Transcript of Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2000, pp:184-193 [Conf]
  26. Virgil D. Gligor, Matt Blaze, John Ioannidis
    Denial of Service - Panel Discussion. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2000, pp:194-203 [Conf]
  27. Frank Stajano
    The Resurrecting Duckling - What Next? [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2000, pp:204-214 [Conf]
  28. Frank Stajano
    The Resurrecting Duckling - What Next? (Transcript of Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2000, pp:215-222 [Conf]
  29. George Danezis
    An Anonymous Auction Protocol Using "Money Escrow" (Transcript of Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2000, pp:223-233 [Conf]
  30. Wenbo Mao
    Short Certification of Secure RSA Modulus (Transcript of Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2000, pp:234-237 [Conf]
  31. Hiroshi Yoshiura, Takaaki Shigematsu, Seiichi Susaki, Tsukasa Saitoh, Hisashi Toyoshima, Chikako Kurita, Satoru Tezuka, Ryôichi Sasaki
    Authenticating Web-Based Virtual Shops Using Signature-Embedded Marks - A Practical Analysis. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2000, pp:238-248 [Conf]
  32. Hiroshi Yoshiura
    Authentication Web-Based Virtual Shops Using Signature-Embedded Marks - A Practical Analysis (Transcript of Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2000, pp:249-252 [Conf]
  33. T. Mark A. Lomas
    I Cannot Tell a Lie (Transcript of Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2000, pp:253-255 [Conf]

  34. Afterward. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2000, pp:256- [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002