3. CCS 1996:
New Delhi,
India
CCS '96,
Proceedings of the 3rd ACM Conference on Computer and Communications Security,
March 14-16 1996,
New Delhi,
India. ACM,
1996
- Vipin Samar:
Unified Login with Pluggable Authentication Modules (PAM).
1-10
- Burkhard Wiegel:
Secure External References in Multimedia Email Messages.
11-18
- Shaw-Cheng Chuang:
Securing ATM Networks.
19-30
- Michael Steiner, Gene Tsudik, Michael Waidner:
Diffie-Hellman Key Distribution Extended to Group Communication.
31-37
- Michael K. Reiter, Matthew K. Franklin, John B. Lacy, Rebecca N. Wright:
The Omega Key Management Service.
38-47
- Masahiro Mambo, Keisuke Usuda, Eiji Okamoto:
Proxy Signatures for Delegating Signing Operation.
48-57
- David M'Raïhi, David Naccache:
Batch Exponentiation: A Fast DLP-Based Signature Generation Strategy.
58-61
- Rynson W. H. Lau, Kwok-Yan Lam, Siu Leung Chung:
The Failure of Anti-Hacking Legislation: A Hong Kong Perspective.
62-67
- Tsutomu Matsumoto:
Human-Computer Cryptography: An Attempt.
68-75
- Markus Jakobsson, Moti Yung:
Revokable and Versatile Electronic Money (extended abstract).
76-87
- Jan Camenisch, Jean-Marc Piveteau, Markus Stadler:
An Efficient Fair Payment System.
88-94
- Stuart G. Stubblebine, Rebecca N. Wright:
An Authentication Logic Supporting Synchronization, Revocation, and Recency.
95-105
- Dominique Bolignano:
An Approach to the Formal Verification of Cryptographic Protocols.
106-118
- Indrajit Ray, Elisa Bertino, Sushil Jajodia, Luigi V. Mancini:
An Advanced Commit Protocol for MLS Distributed Database Systems.
119-128
- David M. Goldschlag:
Several Secure Store and Forward Devices.
129-137
- Serge Vaudenay:
An Experiment on DES Statistical Cryptanalysis.
139-147
- Markus Michels, Holger Petersen, Patrick Horster:
Breaking and Repairing a Convertible Undeniable Signature Scheme.
148-152
- Hung-Min Sun, Shiuh-Pyng Shieh:
Cryptanalysis of Private-Key Encryption Schemes Based on Burst-Error-Correcting Codes.
153-156
- Moni Naor, Avishai Wool:
Access Control and Signatures via Quorum Secret Sharing.
157-168
- Elisa Bertino, Sushil Jajodia, Pierangela Samarati:
A Non-Timestamped Authorization Model for Data Management Systems.
169-178
Copyright © Sun Mar 14 22:57:23 2010
by Michael Ley (ley@uni-trier.de)