default search action
3rd CCS 1996: New Delhi, India
- Li Gong, Jacques Stearn:
CCS '96, Proceedings of the 3rd ACM Conference on Computer and Communications Security, New Delhi, India, March 14-16, 1996. ACM 1996, ISBN 0-89791-829-0 - Vipin Samar:
Unified Login with Pluggable Authentication Modules (PAM). 1-10 - Burkhard Wiegel:
Secure External References in Multimedia Email Messages. 11-18 - Shaw-Cheng Chuang:
Securing ATM Networks. 19-30 - Michael Steiner, Gene Tsudik, Michael Waidner:
Diffie-Hellman Key Distribution Extended to Group Communication. 31-37 - Michael K. Reiter, Matthew K. Franklin, John B. Lacy, Rebecca N. Wright:
The Omega Key Management Service. 38-47 - Masahiro Mambo, Keisuke Usuda, Eiji Okamoto:
Proxy Signatures for Delegating Signing Operation. 48-57 - David M'Raïhi, David Naccache:
Batch Exponentiation: A Fast DLP-Based Signature Generation Strategy. 58-61 - Rynson W. H. Lau, Kwok-Yan Lam, Siu Leung Chung:
The Failure of Anti-Hacking Legislation: A Hong Kong Perspective. 62-67 - Tsutomu Matsumoto:
Human-Computer Cryptography: An Attempt. 68-75 - Markus Jakobsson, Moti Yung:
Revokable and Versatile Electronic Money (extended abstract). 76-87 - Jan Camenisch, Jean-Marc Piveteau, Markus Stadler:
An Efficient Fair Payment System. 88-94 - Stuart G. Stubblebine, Rebecca N. Wright:
An Authentication Logic Supporting Synchronization, Revocation, and Recency. 95-105 - Dominique Bolignano:
An Approach to the Formal Verification of Cryptographic Protocols. 106-118 - Indrajit Ray, Elisa Bertino, Sushil Jajodia, Luigi V. Mancini:
An Advanced Commit Protocol for MLS Distributed Database Systems. 119-128 - David M. Goldschlag:
Several Secure Store and Forward Devices. 129-137 - Serge Vaudenay:
An Experiment on DES Statistical Cryptanalysis. 139-147 - Markus Michels, Holger Petersen, Patrick Horster:
Breaking and Repairing a Convertible Undeniable Signature Scheme. 148-152 - Hung-Min Sun, Shiuh-Pyng Shieh:
Cryptanalysis of Private-Key Encryption Schemes Based on Burst-Error-Correcting Codes. 153-156 - Moni Naor, Avishai Wool:
Access Control and Signatures via Quorum Secret Sharing. 157-168 - Elisa Bertino, Sushil Jajodia, Pierangela Samarati:
A Non-Timestamped Authorization Model for Data Management Systems. 169-178
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.