2. CCS 1994:
Fairfax,
Virginia,
USA
CCS '94,
Proceedings of the 2nd ACM Conference on Computer and Communications Security,
November 2-4,
1994,
Fairfax,
Virginia,
USA. ACM,
1994
- Trent Jaeger, Atul Prakash:
Support for the File System Security Requirements of Computational E-Mail Systems.
1-9
Electronic Edition (ACM DL) BibTeX
- Vaduvur Bharghavan:
Secure Wireless LANs.
10-17
Electronic Edition (ACM DL) BibTeX
- Gene H. Kim, Eugene H. Spafford:
The Design and Implementation of Tripwire: A File System Integrity Checker.
18-29
Electronic Edition (ACM DL) BibTeX
- Marjan Jurecic, Herbert Bunz:
Exchange of Patient Records - Prototype Implementation of a Security Attributes Service in X.500.
30-38
Electronic Edition (ACM DL) BibTeX
- Edward Amoroso, Carol Taylor, John Watson, Jonathan Weiss:
A Process-Oriented Methodology for Assessing and Improving Software Trustworthiness.
39-50
Electronic Edition (ACM DL) BibTeX
- Thomas Beth, Hans-Joachim Knobloch, Marcus Otten, Gustavus J. Simmons, Peer Wichmann:
Towards Acceptable Key Escrow Systems.
51-58
Electronic Edition (ACM DL) BibTeX
- Matt Blaze:
Protocol Failure in the Escrowed Encryption Standard.
59-67
Electronic Edition (ACM DL) BibTeX
- Michael K. Reiter:
Secure Agreement Protocols: Reliable and Atomic Group Multicast in Rampart.
68-80
Electronic Edition (ACM DL) BibTeX
- Mike Just, Evangelos Kranakis, Danny Krizanc, Paul C. van Oorschot:
On Key Distribution via True Broadcasting.
81-88
Electronic Edition (ACM DL) BibTeX
- Chris Charnes, Josef Pieprzyk, Reihaneh Safavi-Naini:
Conditionally Secure Secret Sharing Schemes with Disenrollment Capability.
89-95
Electronic Edition (ACM DL) BibTeX
- Patrick Horster, Holger Petersen, Markus Michels:
Meta-ElGamal Signature Schemes.
96-107
Electronic Edition (ACM DL) BibTeX
- Steven H. Low, Sanjoy Paul, Nicholas F. Maxemchuk:
Anonymous Credit Cards.
108-117
Electronic Edition (ACM DL) BibTeX
- Paul Ammann, Sushil Jajodia:
An Efficient Multiversion Algorithm for Secure Servicing of Transaction Reads.
118-125
Electronic Edition (ACM DL) BibTeX
- Elisa Bertino, Claudio Bettini, Pierangela Samarati:
A Temporal Authorization Model.
126-135
Electronic Edition (ACM DL) BibTeX
- Pierangela Samarati, Paul Ammann, Sushil Jajodia:
Propagation of Authorizations in Distributed Database Systems.
136-147
Electronic Edition (ACM DL) BibTeX
- Howard M. Heys, Stafford E. Tavares:
The Design of Substitution-Permutation Networks Resistant to Differential and Linear Cryptanalysis.
148-155
Electronic Edition (ACM DL) BibTeX
- M. Zhang, Stafford E. Tavares, L. L. Campbell:
Information Leakage of Boolean Functions and Its Relationship to Other Cryptographic Criteria.
156-165
Electronic Edition (ACM DL) BibTeX
- L. Tombak, Reihaneh Safavi-Naini:
Authentication Codes That Are r-Fold Secure Against Spoofing.
166-169
Electronic Edition (ACM DL) BibTeX
- Gennady Medvinsky, Charlie Lai, B. Clifford Neuman:
Endorsements, Licensing, and Insurance for Distributed System Services.
170-175
Electronic Edition (ACM DL) BibTeX
- Li Gong:
New Protocols for Third-Party-Based Authentication and Secure Broadcast.
176-183
Electronic Edition (ACM DL) BibTeX
- Tatsuaki Okamoto, Kazuo Ohta:
How to Simultaneously Exchange Secrets by General Assumptions.
184-192
Electronic Edition (ACM DL) BibTeX
- Warwick Ford, Michael J. Wiener:
A Key Distribution Method for Object-Based Protection.
193-197
Electronic Edition (ACM DL) BibTeX
- Thomas R. Cain, Alan T. Sherman:
How to Break Gifford's Cipher (extended abstract).
198-209
Electronic Edition (ACM DL) BibTeX
- Paul C. van Oorschot, Michael J. Wiener:
Parallel Collision Search with Application to Hash Functions and Discrete Logarithms.
210-218
Electronic Edition (ACM DL) BibTeX
- Refik Molva, Erich Rütsche:
Application Access Control at Network Level.
219-228
Electronic Edition (ACM DL) BibTeX
- P. Rolin, Laurent Toutain, Sylvain Gombault:
Network Security Probe.
229-240
Electronic Edition (ACM DL) BibTeX
- Alison Anderson, Dennis Longley, Lam-for Kwok:
Security Modelling for Organisations.
241-250
Electronic Edition (ACM DL) BibTeX
- James W. Coyne, Norman C. Kluksdahl:
``Mainstreaming'' Automated Information Systems Security Engineering (a case study in security run amok).
251-257
Electronic Edition (ACM DL) BibTeX
- Heather M. Hinton, E. Stewart Lee:
The Compatibility of Policies.
258-269
Electronic Edition (ACM DL) BibTeX
- Randy Browne:
An Entropy Conservation Law for Testing the Completeness of Convert Channel Analysis.
270-281
Electronic Edition (ACM DL) BibTeX
- John P. Nestor, E. S. Lee:
Prerequisite Confidentiality.
282-293
Electronic Edition (ACM DL) BibTeX
Copyright © Sat May 16 23:00:58 2009
by Michael Ley (ley@uni-trier.de)