


default search action
4th Communications and Multimedia Security 1999: Leuven, Belgium
- Bart Preneel:

Secure Information Networks: Communications and Multimedia Security, IFIP TC6/TC11 Joint Working Conference on Communications and Multimedia Security (CMS '99), September 20-21, 1999, Leuven, Belgium. IFIP Conference Proceedings 152, Kluwer 1999, ISBN 0-7923-8600-0
Network Security: ATM and ISDN
- Stelios Karanastasis, Ahmed Patel:

Security On ATM Networks. Communications and Multimedia Security 1999: 3-20 - Herbert Leitold, Karl C. Posch, Reinhard Posch:

ISDN Security services. Communications and Multimedia Security 1999: 21-35 - Olivier Paul, Maryline Laurent:

An Alternative Access Control Architecture for IP over ATM Networks. Communications and Multimedia Security 1999: 36-52
Applied Cryptology I
- Yvo Desmedt, Brian King:

Verifiable Democracy. Communications and Multimedia Security 1999: 53-70 - Markus Jakobsson, Claus-Peter Schnorr:

Efficient Oblivious Proofs of Correct Exponentiation. Communications and Multimedia Security 1999: 71-86
Entity Authentication and Key Agreement Protocols
- Martin Stanek, Daniel Olejár:

Weaknesses in EHA Authentication and Key Distribution Protocol. Communications and Multimedia Security 1999: 87-95 - Gunnar Jacobson:

Formal Design of Efficient Authentication and Key-Agreement. Communications and Multimedia Security 1999: 96-116
Applications
- Per Kaijser:

On Authentication, Digital Signatures and Signature Laws. Communications and Multimedia Security 1999: 117-132 - Thumrongrat Amornraksa, David R. B. Burgess, Peter Sweeney:

Watermarking and Secure Distribution for Encrypted Video. Communications and Multimedia Security 1999: 131-142 - Constantinos Markantonakis, Simeon Xenitellis:

Implementing a Secure Log File Download Manager for the Java Card. Communications and Multimedia Security 1999: 143-162
Network Security: IP
- Rolf Oppliger:

Protecting Key Exchange and Management Protocols Against Resource Clogging Attacks. Communications and Multimedia Security 1999: 163-175 - William A. Adamson, Charles J. Antonelli, Kevin Coffman, Patrick D. McDaniel, Jim Rees:

Secure Distributed Virtual Conferencing. Communications and Multimedia Security 1999: 176-190 - Thomas Hardjono, Brad Cain:

PIM -SM Security: Interdomain Issues and Solutions. Communications and Multimedia Security 1999: 191-208
Protocols for Mobile Applications
- Markku-Juhani Olavi Saarinen:

Attacks against the WAP WTLS protocol. Communications and Multimedia Security 1999: 209-215 - Sheng-Bo Xu, Cees Jansen, Henk C. A. van Tilborg:

A New Authentication Protocol for Portable Communication Systems. Communications and Multimedia Security 1999: 216-230 - Yi Cheng, Arne Norefors:

Token Based Authentication for Handover Security. Communications and Multimedia Security 1999: 231-246
Applied Cryptology II
- Jörg Schwenk:

How to Security Broadcast a Secret. Communications and Multimedia Security 1999: 247-257 - Markus Jakobsson, Ari Juels:

Proofs of Work and Bread Pudding Protocols. Communications and Multimedia Security 1999: 258-272 - Takeyuki Uehara, Reihaneh Safavi-Naini:

Attack on Liu/Farrell/Boyd Arithmetic Coding Encryption Scheme. Communications and Multimedia Security 1999: 273-290
Web Security
- Wolfgang Platzer:

Secure Data- Transfer for Web- Based Applications. Communications and Multimedia Security 1999: 291-302 - Paul Ashley, Mark Vandenwauver, Joris Claessens:

Using SESAME to Secure Web Based Applications on an Intranet. Communications and Multimedia Security 1999: 303-318

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














