


default search action
8th CCS 2001: Philadelphia, Pennsylvania, USA
- Michael K. Reiter, Pierangela Samarati:

CCS 2001, Proceedings of the 8th ACM Conference on Computer and Communications Security, Philadelphia, Pennsylvania, USA, November 6-8, 2001. ACM 2001, ISBN 1-58113-385-5
Password Management and Digital Signatures
- Niklas Frykholm, Ari Juels:

Error-tolerant password recovery. 1-9 - Philip D. MacKenzie, Michael K. Reiter:

Delegation of cryptographic servers for capture-resilient devices. 10-19 - David Naccache, David Pointcheval

, Jacques Stern:
Twin signatures: an alternative to the hash-and-sign paradigm. 20-27 - Adrian Perrig:

The BiBa one-time signature and broadcast authentication protocol. 28-37
Access Control
- Duminda Wijesekera, Sushil Jajodia:

Policy algebras for access control: the propositional case. 38-47 - Vijayalakshmi Atluri

, Soon Ae Chun, Pietro Mazzoleni:
A Chinese wall security model for decentralized workflow systems. 48-57 - Gustaf Neumann, Mark Strembeck:

Design and implementation of a flexible RBAC-service in an object-oriented scripting language. 58-67
Mobile Code and Distributed Systems
- Naoya Nitta, Yoshiaki Takata, Hiroyuki Seki:

An efficient security verification method for programs with stack inspection. 68-77 - Alan Harbitter, Daniel A. Menascé:

The performance of public key-enabled kerberos authentication in mobile computing applications. 78-85 - Giuseppe Ateniese

, Stefan Mangard:
A new approach to DNS security (DNSSEC). 86-95
Protocols
- Federico Crazzolara, Glynn Winskel:

Events in security protocols. 96-105 - Joseph Y. Halpern, Riccardo Pucella:

On the relationship between strand spaces and multi-agent systems. 106-115 - C. Andrew Neff:

A verifiable secret shuffle and its application to e-voting. 116-125
Secure Data Publishing and Certificate Management
- Marc Waldman, David Mazières:

Tangler: a censorship-resistant publishing system based on document entanglements. 126-135 - Premkumar T. Devanbu, Michael Gertz, April Kwong, Charles U. Martel, Glen Nuckolls, Stuart G. Stubblebine:

Flexible authentication of XML documents. 136-145 - Ting Yu, Marianne Winslett, Kent E. Seamons

:
Interoperable strategies in automated trust negotiation. 146-155 - Ninghui Li, William H. Winsborough, John C. Mitchell:

Distributed credential chain discovery in trust management: extended abstract. 156-165
Protocol Analysis
- Jonathan K. Millen, Vitaly Shmatikov:

Constraint solving for bounded-process cryptographic protocol analysis. 166-175 - Rohit Chadha, Max I. Kanovich, Andre Scedrov:

Inductive methods and contract-signing protocols. 176-185 - Joshua D. Guttman, F. Javier Thayer, Lenore D. Zuck:

The faithfulness of abstract protocol analysis: message authentication. 186-195
Cryptosystems
- Phillip Rogaway, Mihir Bellare, John Black, Ted Krovetz

:
OCB: a block-cipher mode of operation for efficient authenticated encryption. 196-205 - Dario Catalano, Rosario Gennaro, Nick Howgrave-Graham, Phong Q. Nguyen:

Paillier's cryptosystem revisited. 206-214 - Stuart Haber, Benny Pinkas:

Securely combining public-key cryptosystems. 215-224
Group Key Management and Signatures
- Dawn Xiaodong Song:

Practical forward secure group signature schemes. 225-234 - Catherine Meadows, Paul F. Syverson:

Formalizing GDOI group key management requirements in NPATRL. 235-244 - Silvio Micali, Kazuo Ohta, Leonid Reyzin:

Accountable-subgroup multisignatures: extended abstract. 245-254 - Emmanuel Bresson, Olivier Chevassut, David Pointcheval

, Jean-Jacques Quisquater:
Provably authenticated group Diffie-Hellman key exchange. 255-264

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














