default search action
5th CCS 1998: San Francisco, CA, USA
- Li Gong, Michael K. Reiter:
CCS '98, Proceedings of the 5th ACM Conference on Computer and Communications Security, San Francisco, CA, USA, November 3-5, 1998. ACM 1998, ISBN 1-58113-007-4 - Klaus Becker, Uta Wille:
Communication Complexity of Group Key Distribution. 1-6 - Avishai Wool:
Key Management for Encrypted broadcast. 7-16 - Giuseppe Ateniese, Michael Steiner, Gene Tsudik:
Authenticated Group Key Agreement and Friends. 17-26 - David Mazières, M. Frans Kaashoek:
The Design, Implementation and Operation of an Email Pseudonym Server. 27-36 - Paul F. Syverson:
Anonymity on the Internet (Panel). 37 - Guy Edjlali, Anurag Acharya, Vipin Chaudhary:
History-Based Access Control for Mobile Code. 38-48 - Allen Goldberg:
A Specification of Java Loading and Bytecode Verification. 49-58 - David Naccache, Jacques Stern:
A New Public Key Cryptosystem Based on Higher Residues. 59-66 - Rosario Gennaro, Daniele Micciancio, Tal Rabin:
An Efficient Non-Interactive Statistical Zero-Knowledge Proof System for Quasi-Safe Prime Products. 67-72 - Alfredo De Santis, Giovanni Di Crescenzo, Giuseppe Persiano:
Communication-Efficient Anonymous Group Identification. 73-82 - Ian T. Foster, Carl Kesselman, Gene Tsudik, Steven Tuecke:
A Security Architecture for Computational Grids. 83-92 - Jun Xu, Mukesh Singhal:
Design of a High-Performance ATM Firewall. 93-102 - Markus Jakobsson, Elizabeth A. M. Shriver, Bruce Hillyer, Ari Juels:
A Practical Secure Physical Random Bit Generator. 103-111 - Patrick Lincoln, John C. Mitchell, Mark Mitchell, Andre Scedrov:
A Probabilistic Poly-Time Framework for Protocol Analysis. 112-121 - Shai Halevi, Hugo Krawczyk:
Public-Key Cryptography and Password Protocols. 122-131 - Bruce Schneier, Mudge:
Cryptanalysis of Microsoft's Point-to-Point Tunneling Protocol (PPTP). 132-141 - Eran Gabber, Avishai Wool:
How to Prove Where You Are: Tracking the Location of Customer Equipment. 142-149 - Terran Lane, Carla E. Brodley:
Temporal Sequence Learning and Data Reduction for Anomaly Detection. 150-158
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.