


default search action
5th CCS 1998: San Francisco, CA, USA
- Li Gong, Michael K. Reiter:

CCS '98, Proceedings of the 5th ACM Conference on Computer and Communications Security, San Francisco, CA, USA, November 3-5, 1998. ACM 1998, ISBN 1-58113-007-4 - Klaus Becker, Uta Wille:

Communication Complexity of Group Key Distribution. 1-6 - Avishai Wool

:
Key Management for Encrypted broadcast. 7-16 - Giuseppe Ateniese

, Michael Steiner, Gene Tsudik:
Authenticated Group Key Agreement and Friends. 17-26 - David Mazières, M. Frans Kaashoek:

The Design, Implementation and Operation of an Email Pseudonym Server. 27-36 - Paul F. Syverson:

Anonymity on the Internet (Panel). 37 - Guy Edjlali, Anurag Acharya, Vipin Chaudhary

:
History-Based Access Control for Mobile Code. 38-48 - Allen Goldberg:

A Specification of Java Loading and Bytecode Verification. 49-58 - David Naccache, Jacques Stern:

A New Public Key Cryptosystem Based on Higher Residues. 59-66 - Rosario Gennaro, Daniele Micciancio

, Tal Rabin:
An Efficient Non-Interactive Statistical Zero-Knowledge Proof System for Quasi-Safe Prime Products. 67-72 - Alfredo De Santis

, Giovanni Di Crescenzo, Giuseppe Persiano:
Communication-Efficient Anonymous Group Identification. 73-82 - Ian T. Foster, Carl Kesselman

, Gene Tsudik, Steven Tuecke
:
A Security Architecture for Computational Grids. 83-92 - Jun Xu, Mukesh Singhal:

Design of a High-Performance ATM Firewall. 93-102 - Markus Jakobsson, Elizabeth A. M. Shriver, Bruce Hillyer, Ari Juels:

A Practical Secure Physical Random Bit Generator. 103-111 - Patrick Lincoln, John C. Mitchell, Mark Mitchell, Andre Scedrov:

A Probabilistic Poly-Time Framework for Protocol Analysis. 112-121 - Shai Halevi, Hugo Krawczyk:

Public-Key Cryptography and Password Protocols. 122-131 - Bruce Schneier, Mudge:

Cryptanalysis of Microsoft's Point-to-Point Tunneling Protocol (PPTP). 132-141 - Eran Gabber, Avishai Wool:

How to Prove Where You Are: Tracking the Location of Customer Equipment. 142-149 - Terran Lane, Carla E. Brodley:

Temporal Sequence Learning and Data Reduction for Anomaly Detection. 150-158

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














