


default search action
2nd CCS 1994: Fairfax, Virginia, USA
- Dorothy E. Denning, Raymond Pyle, Ravi Ganesan, Ravi S. Sandhu:

CCS '94, Proceedings of the 2nd ACM Conference on Computer and Communications Security, Fairfax, Virginia, USA, November 2-4, 1994. ACM 1994, ISBN 0-89791-732-4 - Trent Jaeger, Atul Prakash

:
Support for the File System Security Requirements of Computational E-Mail Systems. 1-9 - Vaduvur Bharghavan:

Secure Wireless LANs. 10-17 - Gene H. Kim, Eugene H. Spafford:

The Design and Implementation of Tripwire: A File System Integrity Checker. 18-29 - Marjan Jurecic, Herbert Bunz:

Exchange of Patient Records - Prototype Implementation of a Security Attributes Service in X.500. 30-38 - Edward Amoroso, Carol Taylor, John Watson, Jonathan Weiss:

A Process-Oriented Methodology for Assessing and Improving Software Trustworthiness. 39-50 - Thomas Beth, Hans-Joachim Knobloch, Marcus Otten, Gustavus J. Simmons, Peer Wichmann:

Towards Acceptable Key Escrow Systems. 51-58 - Matt Blaze:

Protocol Failure in the Escrowed Encryption Standard. 59-67 - Michael K. Reiter:

Secure Agreement Protocols: Reliable and Atomic Group Multicast in Rampart. 68-80 - Mike Just

, Evangelos Kranakis
, Danny Krizanc, Paul C. van Oorschot
:
On Key Distribution via True Broadcasting. 81-88 - Chris Charnes, Josef Pieprzyk

, Reihaneh Safavi-Naini:
Conditionally Secure Secret Sharing Schemes with Disenrollment Capability. 89-95 - Patrick Horster, Holger Petersen, Markus Michels:

Meta-ElGamal Signature Schemes. 96-107 - Steven H. Low, Sanjoy Paul

, Nicholas F. Maxemchuk:
Anonymous Credit Cards. 108-117 - Paul Ammann, Sushil Jajodia:

An Efficient Multiversion Algorithm for Secure Servicing of Transaction Reads. 118-125 - Elisa Bertino, Claudio Bettini

, Pierangela Samarati:
A Temporal Authorization Model. 126-135 - Pierangela Samarati, Paul Ammann, Sushil Jajodia:

Propagation of Authorizations in Distributed Database Systems. 136-147 - Howard M. Heys

, Stafford E. Tavares:
The Design of Substitution-Permutation Networks Resistant to Differential and Linear Cryptanalysis. 148-155 - M. Zhang, Stafford E. Tavares, L. Lorne Campbell:

Information Leakage of Boolean Functions and Its Relationship to Other Cryptographic Criteria. 156-165 - Leonid M. Tombak, Reihaneh Safavi-Naini:

Authentication Codes That Are r-Fold Secure Against Spoofing. 166-169 - Gennady Medvinsky, Charlie Lai, B. Clifford Neuman:

Endorsements, Licensing, and Insurance for Distributed System Services. 170-175 - Li Gong:

New Protocols for Third-Party-Based Authentication and Secure Broadcast. 176-183 - Tatsuaki Okamoto, Kazuo Ohta:

How to Simultaneously Exchange Secrets by General Assumptions. 184-192 - Warwick Ford, Michael J. Wiener:

A Key Distribution Method for Object-Based Protection. 193-197 - Thomas R. Cain, Alan T. Sherman:

How to Break Gifford's Cipher (extended abstract). 198-209 - Paul C. van Oorschot

, Michael J. Wiener:
Parallel Collision Search with Application to Hash Functions and Discrete Logarithms. 210-218 - Refik Molva

, Erich Rütsche:
Application Access Control at Network Level. 219-228 - P. Rolin, Laurent Toutain, Sylvain Gombault:

Network Security Probe. 229-240 - Alison Anderson, Dennis Longley, Lam-for Kwok

:
Security Modelling for Organisations. 241-250 - James W. Coyne, Norman C. Kluksdahl:

"Mainstreaming" Automated Information Systems Security Engineering (a case study in security run amok). 251-257 - Heather M. Hinton, E. Stewart Lee:

The Compatibility of Policies. 258-269 - Randy Browne:

An Entropy Conservation Law for Testing the Completeness of Convert Channel Analysis. 270-281 - John P. Nestor, E. S. Lee:

Prerequisite Confidentiality. 282-293

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














