default search action
7th CCS 2000: Athens, Greece
- Dimitris Gritzalis, Sushil Jajodia, Pierangela Samarati:
CCS 2000, Proceedings of the 7th ACM Conference on Computer and Communications Security, Athens, Greece, November 1-4, 2000. ACM 2000, ISBN 1-58113-203-4
Certificate Management
- John Iliadis, Diomidis Spinellis, Dimitris Gritzalis, Bart Preneel, Sokratis K. Katsikas:
Evaluating certificate status information mechanisms. 1-8 - Ahto Buldas, Peeter Laud, Helger Lipmaa:
Accountable certificate management using undeniable attestations. 9-17 - Rebecca N. Wright, Patrick Lincoln, Jonathan K. Millen:
Efficient fault-tolerant certificate revocation. 19-24
Privacy and Anonymity
- Edward W. Felten, Michael A. Schneider:
Timing attacks on Web privacy. 25-32 - Clay Shields, Brian Neil Levine:
A protocol for anonymous communication over the Internet. 33-42 - Manfred Hauswirth, Clemens Kerer, Roman Kurmanowytsch:
A secure execution framework for Java. 43-52 - Pino Persiano, Ivan Visconti:
User privacy issues regarding certificates and the TLS protocol: the design and implementation of the SPSL protocol. 53-62
Electronic Commerce
- Glenn Durfee, Matthew K. Franklin:
Distribution chain security. 63-70 - Joachim Biskup, Ulrich Flegel:
Threshold-based identity recovery for privacy enhanced applications. 71-79 - Yuji Watanabe, Hideki Imai:
Reducing the round complexity of a sealed-bid auction protocol with an off-line TTP. 80-86 - Michiharu Kudo, Satoshi Hada:
XML document security based on provisional authorization. 87-96
Invited Talk
- Ravi Ganesan:
Security: the state of the practice (invited talk). 97
Panel
- Carlisle M. Adams, Mike Burmester, Yvo Desmedt, Michael K. Reiter, Philip R. Zimmermann:
Which PKI (public key infrastructure) is the right one? (panel session). 98-101
Cryptography and Steganography
- Johannes Merkle:
Multi-round passive attacks on server-aided RSA protocols. 102-107 - Hugo Krawczyk:
Simple forward-secure signatures from any signature scheme. 108-115 - Yvo Desmedt, Tri Van Le:
Moiré cryptography. 116-124 - Johan Håstad, Jakob Jonsson, Ari Juels, Moti Yung:
Funkspiel schemes: an alternative to conventional tamper resistance. 125-133
Access Control
- Piero A. Bonatti, Pierangela Samarati:
Regulating service access and information release on the Web. 134-143 - Avigdor Gal, Vijayalakshmi Atluri:
An authorization model for temporal data. 144-153 - Jonathon Tidswell, Trent Jaeger:
An access control model for simplifying constraint expression. 154-163 - Piero A. Bonatti, Sabrina De Capitani di Vimercati, Pierangela Samarati:
A modular approach to composing access control policies. 164-173
Systems Security
- Massimo Bernaschi, Emanuele Gabrielli, Luigi V. Mancini:
Operating system enhancements to prevent the misuse of system calls. 174-183 - Thomas W. Doeppner Jr., Philip N. Klein, Andrew Koyfman:
Using router stamping to identify the source of IP packets. 184-189 - Sotiris Ioannidis, Angelos D. Keromytis, Steven M. Bellovin, Jonathan M. Smith:
Implementing a distributed firewall. 190-199 - Vijay Varadharajan:
Security enhanced mobile agents. 200-209
Internet Security and Composition
- Ting Yu, Xiaosong Ma, Marianne Winslett:
PRUNES: an efficient and complete strategy for automated trust negotiation over the Internet. 210-219 - Richard Au, Mark Looi, Paul Ashley:
Cross-domain one-shot authorization using smart cards. 220-227 - Reihaneh Safavi-Naini, Huaxiong Wang:
New constructions for multicast re-keying schemes using perfect hash families. 228-234 - Yongdae Kim, Adrian Perrig, Gene Tsudik:
Simple and fault-tolerant key agreement for dynamic collaborative groups. 235-244 - Birgit Pfitzmann, Michael Waidner:
Composition and integrity preservation of secure reactive systems. 245-254
Tutorials
- John Ioannidis, Angelos D. Keromytis:
Network security and IPsec (tutorial). - Yair Frankel:
Electronic payment technologies.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.