5. CCS 1998:
San Francisco,
CA,
USA
 CCS '98,
Proceedings of the 5th ACM Conference on Computer and Communications Security,
November 3-5,
1998,
San Francisco,
CA,
USA. ACM,
1998 
- Klaus Becker, Uta Wille:
 Communication Complexity of Group Key Distribution.
1-6
 Electronic Edition (ACM DL) BibTeX
- Avishai Wool:
 Key Management for Encrypted broadcast.
7-16
 Electronic Edition (ACM DL) BibTeX
- Giuseppe Ateniese, Michael Steiner, Gene Tsudik:
 Authenticated Group Key Agreement and Friends.
17-26
 Electronic Edition (ACM DL) BibTeX
- David Mazières, M. Frans Kaashoek:
 The Design, Implementation and Operation of an Email Pseudonym Server.
27-36
 Electronic Edition (ACM DL) BibTeX
- Paul F. Syverson:
 Anonymity on the Internet (Panel).
37
 Electronic Edition (ACM DL) BibTeX
- Guy Edjlali, Anurag Acharya, Vipin Chaudhary:
 History-Based Access Control for Mobile Code.
38-48
 Electronic Edition (ACM DL) BibTeX
- Allen Goldberg:
 A Specification of Java Loading and Bytecode Verification.
49-58
 Electronic Edition (ACM DL) BibTeX
- David Naccache, Jacques Stern:
 A New Public Key Cryptosystem Based on Higher Residues.
59-66
 Electronic Edition (ACM DL) BibTeX
- Rosario Gennaro, Daniele Micciancio, Tal Rabin:
 An Efficient Non-Interactive Statistical Zero-Knowledge Proof System for Quasi-Safe Prime Products.
67-72
 Electronic Edition (ACM DL) BibTeX
- Alfredo De Santis, Giovanni Di Crescenzo, Giuseppe Persiano:
 Communication-Efficient Anonymous Group Identification.
73-82
 Electronic Edition (ACM DL) BibTeX
- Ian T. Foster, Carl Kesselman, Gene Tsudik, Steven Tuecke:
 A Security Architecture for Computational Grids.
83-92
 Electronic Edition (ACM DL) BibTeX
- Jun Xu, Mukesh Singhal:
 Design of a High-Performance ATM Firewall.
93-102
 Electronic Edition (ACM DL) BibTeX
- Markus Jakobsson, Elizabeth A. M. Shriver, Bruce Hillyer, Ari Juels:
 A Practical Secure Physical Random Bit Generator.
103-111
 Electronic Edition (ACM DL) BibTeX
- Patrick Lincoln, John C. Mitchell, Mark Mitchell, Andre Scedrov:
 A Probabilistic Poly-Time Framework for Protocol Analysis.
112-121
 Electronic Edition (ACM DL) BibTeX
- Shai Halevi, Hugo Krawczyk:
 Public-Key Cryptography and Password Protocols.
122-131
 Electronic Edition (ACM DL) BibTeX
- Bruce Schneier, Mudge:
 Cryptanalysis of Microsoft's Point-to-Point Tunneling Protocol (PPTP).
132-141
 Electronic Edition (ACM DL) BibTeX
- Eran Gabber, Avishai Wool:
 How to Prove Where You Are: Tracking the Location of Customer Equipment.
142-149
 Electronic Edition (ACM DL) BibTeX
- Terran Lane, Carla E. Brodley:
 Temporal Sequence Learning and Data Reduction for Anomaly Detection.
150-158
 Electronic Edition (ACM DL) BibTeX
Copyright © Sat May 16 23:00:58 2009
 by Michael Ley (ley@uni-trier.de)