1. CCS 1993:
Fairfax,
Virginia,
USA
CCS '93,
Proceedings of the 1st ACM Conference on Computer and Communications Security,
November 3-5,
1993,
Fairfax,
Virginia,
USA. ACM,
1993
- Ralf C. Hauser:
Does Licensing Require New Access Control Techniques?
1-8
- Matt Blaze:
A Cryptographic File System for UNIX.
9-16
- Miguel Soriano, Jordi Forné, Francisco Recacha, José L. Melús:
A Particular Solution to Provide Secure Communications in an Ethernet Environment.
17-25
- Li Gong:
Lower Bounds on Messages and Rounds for Network Authentication Protocols.
26-37
- Raphael Yahalom:
Optimality of Multi-Domain Protocols.
38-48
- Gene Tsudik, Els Van Herreweghen:
On Simple and Secure Key Distribution.
49-57
- Kaisa Nyberg, Rainer A. Rueppel:
A New Signature Scheme Based on the DSA Giving Message Recovery.
58-61
- Mihir Bellare, Phillip Rogaway:
Random Oracles are Practical: A Paradigm for Designing Efficient Protocols.
62-73
- Birgit Pfitzmann:
Sorting Out Signature Schemes.
74-85
- Patrick W. Brown:
Digital Signatures: Can They be Accepted as Legal Signatures in EDI?
86-92
- Donald Byron Johnson, Stephen M. Matyas, An V. Le, John D. Wilkins:
Design of the Commercial Data Masking Facility Data Privacy Algorithm.
93-96
- Paul F. Syverson:
Adding Time to a Logic of Authentication.
97-101
- Gennady Medvinsky, B. Clifford Neuman:
NetCash: A Design for Practical Electronic Currency on the Internet.
102-106
- Dan Brown:
Security Planning for Personal Communications.
107-111
- Thomas Y. C. Woo, Simon S. Lam:
A Framework for Distributed Authorization.
112-118
- Myong H. Kang, Ira S. Moskowitz:
A Pump for Rapid, Reliable, Secure Communication.
119-129
- Elisa Bertino, Pierangela Samarati, Sushil Jajodia:
Authorizations in Relational Database Management Systems.
130-139
- Elisa Bertino, Pierangela Samarati, Sushil Jajodia:
High Assurance Discretionary Access Control for Object Bases.
140-150
- Roger M. Needham:
Denial of Service.
151-153
- Calvin Ko, Deborah A. Frincke, Terrance Goan, Todd L. Heberlein, Karl N. Levitt, Biswanath Mukherjee, Christopher Wee:
Analysis of an Algorithm for Distributed Recognition and Accountability.
154-164
- Ping Lin, C. Sekar Chandersekaran:
Integration of DCE and Local Registries: Design Approaches.
165-170
- Jennifer Seberry, Xian-Mo Zhang, Yuliang Zheng:
Systematic Generation of Cryptographically Robust S-Boxes.
171-182
- Bart Preneel, René Govaerts, Joos Vandewalle:
Differential Cryptanalysis of Hash Functions Based on Block Ciphers.
183-188
- Thomas Beth, Hans-Joachim Knobloch, Marcus Otten:
Verifiable Secret Sharing for Monotone Access Structures.
189-194
- Hank M. Kluepfel:
Securing a Global Village and Its Resources: Baseline Security for Interconnected Signaling System #7 Telecommunications Networks.
195-212
- Gustavus J. Simmons:
Cryptanalysis and Protocol Failures (abstract).
213-214
- Ross J. Anderson:
Why Cryptosystems Fail.
215-227
- Yvo Desmedt, Mike Burmester:
Towards Practical ``Proven Secure'' Authenticated Key Distribution.
228-231
- Paul C. van Oorschot:
Extending Cryptographic Logics of Belief to Key Agreement Protocols.
232-243
- Steven M. Bellovin, Michael Merritt:
Augmented Encrypted Key Exchange: A Password-Based Protocol Secure against Dictionary Attacks and Password File Compromise.
244-250
Copyright © Sun Mar 14 22:57:23 2010
by Michael Ley (ley@uni-trier.de)