default search action
Search dblp for Publications
export results for "toc:db/conf/ccs/ccs1996.bht:"
@inproceedings{DBLP:conf/ccs/BertinoJS96, author = {Elisa Bertino and Sushil Jajodia and Pierangela Samarati}, editor = {Li Gong and Jacques Stearn}, title = {A Non-Timestamped Authorization Model for Data Management Systems}, booktitle = {{CCS} '96, Proceedings of the 3rd {ACM} Conference on Computer and Communications Security, New Delhi, India, March 14-16, 1996}, pages = {169--178}, publisher = {{ACM}}, year = {1996}, url = {https://doi.org/10.1145/238168.238211}, doi = {10.1145/238168.238211}, timestamp = {Tue, 10 Nov 2020 20:00:41 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BertinoJS96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Bolignano96, author = {Dominique Bolignano}, editor = {Li Gong and Jacques Stearn}, title = {An Approach to the Formal Verification of Cryptographic Protocols}, booktitle = {{CCS} '96, Proceedings of the 3rd {ACM} Conference on Computer and Communications Security, New Delhi, India, March 14-16, 1996}, pages = {106--118}, publisher = {{ACM}}, year = {1996}, url = {https://doi.org/10.1145/238168.238196}, doi = {10.1145/238168.238196}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Bolignano96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CamenischPS96, author = {Jan Camenisch and Jean{-}Marc Piveteau and Markus Stadler}, editor = {Li Gong and Jacques Stearn}, title = {An Efficient Fair Payment System}, booktitle = {{CCS} '96, Proceedings of the 3rd {ACM} Conference on Computer and Communications Security, New Delhi, India, March 14-16, 1996}, pages = {88--94}, publisher = {{ACM}}, year = {1996}, url = {https://doi.org/10.1145/238168.238193}, doi = {10.1145/238168.238193}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/CamenischPS96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Chuang96, author = {Shaw{-}Cheng Chuang}, editor = {Li Gong and Jacques Stearn}, title = {Securing {ATM} Networks}, booktitle = {{CCS} '96, Proceedings of the 3rd {ACM} Conference on Computer and Communications Security, New Delhi, India, March 14-16, 1996}, pages = {19--30}, publisher = {{ACM}}, year = {1996}, url = {https://doi.org/10.1145/238168.238181}, doi = {10.1145/238168.238181}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Chuang96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Goldschlag96, author = {David M. Goldschlag}, editor = {Li Gong and Jacques Stearn}, title = {Several Secure Store and Forward Devices}, booktitle = {{CCS} '96, Proceedings of the 3rd {ACM} Conference on Computer and Communications Security, New Delhi, India, March 14-16, 1996}, pages = {129--137}, publisher = {{ACM}}, year = {1996}, url = {https://doi.org/10.1145/238168.238200}, doi = {10.1145/238168.238200}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Goldschlag96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JakobssonY96, author = {Markus Jakobsson and Moti Yung}, editor = {Li Gong and Jacques Stearn}, title = {Revokable and Versatile Electronic Money (extended abstract)}, booktitle = {{CCS} '96, Proceedings of the 3rd {ACM} Conference on Computer and Communications Security, New Delhi, India, March 14-16, 1996}, pages = {76--87}, publisher = {{ACM}}, year = {1996}, url = {https://doi.org/10.1145/238168.238191}, doi = {10.1145/238168.238191}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/JakobssonY96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LauLC96, author = {Rynson W. H. Lau and Kwok{-}Yan Lam and Siu Leung Chung}, editor = {Li Gong and Jacques Stearn}, title = {The Failure of Anti-Hacking Legislation: {A} Hong Kong Perspective}, booktitle = {{CCS} '96, Proceedings of the 3rd {ACM} Conference on Computer and Communications Security, New Delhi, India, March 14-16, 1996}, pages = {62--67}, publisher = {{ACM}}, year = {1996}, url = {https://doi.org/10.1145/238168.238189}, doi = {10.1145/238168.238189}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LauLC96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MRaihiN96, author = {David M'Ra{\"{\i}}hi and David Naccache}, editor = {Li Gong and Jacques Stearn}, title = {Batch Exponentiation: {A} Fast DLP-Based Signature Generation Strategy}, booktitle = {{CCS} '96, Proceedings of the 3rd {ACM} Conference on Computer and Communications Security, New Delhi, India, March 14-16, 1996}, pages = {58--61}, publisher = {{ACM}}, year = {1996}, url = {https://doi.org/10.1145/238168.238187}, doi = {10.1145/238168.238187}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MRaihiN96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MamboUO96, author = {Masahiro Mambo and Keisuke Usuda and Eiji Okamoto}, editor = {Li Gong and Jacques Stearn}, title = {Proxy Signatures for Delegating Signing Operation}, booktitle = {{CCS} '96, Proceedings of the 3rd {ACM} Conference on Computer and Communications Security, New Delhi, India, March 14-16, 1996}, pages = {48--57}, publisher = {{ACM}}, year = {1996}, url = {https://doi.org/10.1145/238168.238185}, doi = {10.1145/238168.238185}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MamboUO96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Matsumoto96, author = {Tsutomu Matsumoto}, editor = {Li Gong and Jacques Stearn}, title = {Human-Computer Cryptography: An Attempt}, booktitle = {{CCS} '96, Proceedings of the 3rd {ACM} Conference on Computer and Communications Security, New Delhi, India, March 14-16, 1996}, pages = {68--75}, publisher = {{ACM}}, year = {1996}, url = {https://doi.org/10.1145/238168.238190}, doi = {10.1145/238168.238190}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Matsumoto96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MichelsPH96, author = {Markus Michels and Holger Petersen and Patrick Horster}, editor = {Li Gong and Jacques Stearn}, title = {Breaking and Repairing a Convertible Undeniable Signature Scheme}, booktitle = {{CCS} '96, Proceedings of the 3rd {ACM} Conference on Computer and Communications Security, New Delhi, India, March 14-16, 1996}, pages = {148--152}, publisher = {{ACM}}, year = {1996}, url = {https://doi.org/10.1145/238168.238207}, doi = {10.1145/238168.238207}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MichelsPH96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/NaorW96, author = {Moni Naor and Avishai Wool}, editor = {Li Gong and Jacques Stearn}, title = {Access Control and Signatures via Quorum Secret Sharing}, booktitle = {{CCS} '96, Proceedings of the 3rd {ACM} Conference on Computer and Communications Security, New Delhi, India, March 14-16, 1996}, pages = {157--168}, publisher = {{ACM}}, year = {1996}, url = {https://doi.org/10.1145/238168.238209}, doi = {10.1145/238168.238209}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/NaorW96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/RayBJM96, author = {Indrajit Ray and Elisa Bertino and Sushil Jajodia and Luigi V. Mancini}, editor = {Li Gong and Jacques Stearn}, title = {An Advanced Commit Protocol for {MLS} Distributed Database Systems}, booktitle = {{CCS} '96, Proceedings of the 3rd {ACM} Conference on Computer and Communications Security, New Delhi, India, March 14-16, 1996}, pages = {119--128}, publisher = {{ACM}}, year = {1996}, url = {https://doi.org/10.1145/238168.238198}, doi = {10.1145/238168.238198}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/RayBJM96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ReiterFLW96, author = {Michael K. Reiter and Matthew K. Franklin and John B. Lacy and Rebecca N. Wright}, editor = {Li Gong and Jacques Stearn}, title = {The Omega Key Management Service}, booktitle = {{CCS} '96, Proceedings of the 3rd {ACM} Conference on Computer and Communications Security, New Delhi, India, March 14-16, 1996}, pages = {38--47}, publisher = {{ACM}}, year = {1996}, url = {https://doi.org/10.1145/238168.238184}, doi = {10.1145/238168.238184}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ReiterFLW96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Samar96, author = {Vipin Samar}, editor = {Li Gong and Jacques Stearn}, title = {Unified Login with Pluggable Authentication Modules {(PAM)}}, booktitle = {{CCS} '96, Proceedings of the 3rd {ACM} Conference on Computer and Communications Security, New Delhi, India, March 14-16, 1996}, pages = {1--10}, publisher = {{ACM}}, year = {1996}, url = {https://doi.org/10.1145/238168.238177}, doi = {10.1145/238168.238177}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Samar96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SteinerTW96, author = {Michael Steiner and Gene Tsudik and Michael Waidner}, editor = {Li Gong and Jacques Stearn}, title = {Diffie-Hellman Key Distribution Extended to Group Communication}, booktitle = {{CCS} '96, Proceedings of the 3rd {ACM} Conference on Computer and Communications Security, New Delhi, India, March 14-16, 1996}, pages = {31--37}, publisher = {{ACM}}, year = {1996}, url = {https://doi.org/10.1145/238168.238182}, doi = {10.1145/238168.238182}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/SteinerTW96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/StubblebineW96, author = {Stuart G. Stubblebine and Rebecca N. Wright}, editor = {Li Gong and Jacques Stearn}, title = {An Authentication Logic Supporting Synchronization, Revocation, and Recency}, booktitle = {{CCS} '96, Proceedings of the 3rd {ACM} Conference on Computer and Communications Security, New Delhi, India, March 14-16, 1996}, pages = {95--105}, publisher = {{ACM}}, year = {1996}, url = {https://doi.org/10.1145/238168.238195}, doi = {10.1145/238168.238195}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/StubblebineW96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SunS96, author = {Hung{-}Min Sun and Shiuh{-}Pyng Shieh}, editor = {Li Gong and Jacques Stearn}, title = {Cryptanalysis of Private-Key Encryption Schemes Based on Burst-Error-Correcting Codes}, booktitle = {{CCS} '96, Proceedings of the 3rd {ACM} Conference on Computer and Communications Security, New Delhi, India, March 14-16, 1996}, pages = {153--156}, publisher = {{ACM}}, year = {1996}, url = {https://doi.org/10.1145/238168.238208}, doi = {10.1145/238168.238208}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SunS96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Vaudenay96, author = {Serge Vaudenay}, editor = {Li Gong and Jacques Stearn}, title = {An Experiment on {DES} Statistical Cryptanalysis}, booktitle = {{CCS} '96, Proceedings of the 3rd {ACM} Conference on Computer and Communications Security, New Delhi, India, March 14-16, 1996}, pages = {139--147}, publisher = {{ACM}}, year = {1996}, url = {https://doi.org/10.1145/238168.238206}, doi = {10.1145/238168.238206}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Vaudenay96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Wiegel96, author = {Burkhard Wiegel}, editor = {Li Gong and Jacques Stearn}, title = {Secure External References in Multimedia Email Messages}, booktitle = {{CCS} '96, Proceedings of the 3rd {ACM} Conference on Computer and Communications Security, New Delhi, India, March 14-16, 1996}, pages = {11--18}, publisher = {{ACM}}, year = {1996}, url = {https://doi.org/10.1145/238168.238179}, doi = {10.1145/238168.238179}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Wiegel96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/1996, editor = {Li Gong and Jacques Stearn}, title = {{CCS} '96, Proceedings of the 3rd {ACM} Conference on Computer and Communications Security, New Delhi, India, March 14-16, 1996}, publisher = {{ACM}}, year = {1996}, url = {http://dl.acm.org/citation.cfm?id=238168}, isbn = {0-89791-829-0}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/1996.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.