default search action
2nd CCS 1994: Fairfax, Virginia, USA
- Dorothy E. Denning, Raymond Pyle, Ravi Ganesan, Ravi S. Sandhu:
CCS '94, Proceedings of the 2nd ACM Conference on Computer and Communications Security, Fairfax, Virginia, USA, November 2-4, 1994. ACM 1994, ISBN 0-89791-732-4 - Trent Jaeger, Atul Prakash:
Support for the File System Security Requirements of Computational E-Mail Systems. 1-9 - Vaduvur Bharghavan:
Secure Wireless LANs. 10-17 - Gene H. Kim, Eugene H. Spafford:
The Design and Implementation of Tripwire: A File System Integrity Checker. 18-29 - Marjan Jurecic, Herbert Bunz:
Exchange of Patient Records - Prototype Implementation of a Security Attributes Service in X.500. 30-38 - Edward Amoroso, Carol Taylor, John Watson, Jonathan Weiss:
A Process-Oriented Methodology for Assessing and Improving Software Trustworthiness. 39-50 - Thomas Beth, Hans-Joachim Knobloch, Marcus Otten, Gustavus J. Simmons, Peer Wichmann:
Towards Acceptable Key Escrow Systems. 51-58 - Matt Blaze:
Protocol Failure in the Escrowed Encryption Standard. 59-67 - Michael K. Reiter:
Secure Agreement Protocols: Reliable and Atomic Group Multicast in Rampart. 68-80 - Mike Just, Evangelos Kranakis, Danny Krizanc, Paul C. van Oorschot:
On Key Distribution via True Broadcasting. 81-88 - Chris Charnes, Josef Pieprzyk, Reihaneh Safavi-Naini:
Conditionally Secure Secret Sharing Schemes with Disenrollment Capability. 89-95 - Patrick Horster, Holger Petersen, Markus Michels:
Meta-ElGamal Signature Schemes. 96-107 - Steven H. Low, Sanjoy Paul, Nicholas F. Maxemchuk:
Anonymous Credit Cards. 108-117 - Paul Ammann, Sushil Jajodia:
An Efficient Multiversion Algorithm for Secure Servicing of Transaction Reads. 118-125 - Elisa Bertino, Claudio Bettini, Pierangela Samarati:
A Temporal Authorization Model. 126-135 - Pierangela Samarati, Paul Ammann, Sushil Jajodia:
Propagation of Authorizations in Distributed Database Systems. 136-147 - Howard M. Heys, Stafford E. Tavares:
The Design of Substitution-Permutation Networks Resistant to Differential and Linear Cryptanalysis. 148-155 - M. Zhang, Stafford E. Tavares, L. Lorne Campbell:
Information Leakage of Boolean Functions and Its Relationship to Other Cryptographic Criteria. 156-165 - Leonid M. Tombak, Reihaneh Safavi-Naini:
Authentication Codes That Are r-Fold Secure Against Spoofing. 166-169 - Gennady Medvinsky, Charlie Lai, B. Clifford Neuman:
Endorsements, Licensing, and Insurance for Distributed System Services. 170-175 - Li Gong:
New Protocols for Third-Party-Based Authentication and Secure Broadcast. 176-183 - Tatsuaki Okamoto, Kazuo Ohta:
How to Simultaneously Exchange Secrets by General Assumptions. 184-192 - Warwick Ford, Michael J. Wiener:
A Key Distribution Method for Object-Based Protection. 193-197 - Thomas R. Cain, Alan T. Sherman:
How to Break Gifford's Cipher (extended abstract). 198-209 - Paul C. van Oorschot, Michael J. Wiener:
Parallel Collision Search with Application to Hash Functions and Discrete Logarithms. 210-218 - Refik Molva, Erich Rütsche:
Application Access Control at Network Level. 219-228 - P. Rolin, Laurent Toutain, Sylvain Gombault:
Network Security Probe. 229-240 - Alison Anderson, Dennis Longley, Lam-for Kwok:
Security Modelling for Organisations. 241-250 - James W. Coyne, Norman C. Kluksdahl:
"Mainstreaming" Automated Information Systems Security Engineering (a case study in security run amok). 251-257 - Heather M. Hinton, E. Stewart Lee:
The Compatibility of Policies. 258-269 - Randy Browne:
An Entropy Conservation Law for Testing the Completeness of Convert Channel Analysis. 270-281 - John P. Nestor, E. S. Lee:
Prerequisite Confidentiality. 282-293
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.