Search dblp for Publications

export results for "toc:db/conf/ccs/ccs1996.bht:"

 download as .bib file

@inproceedings{DBLP:conf/ccs/BertinoJS96,
  author       = {Elisa Bertino and
                  Sushil Jajodia and
                  Pierangela Samarati},
  editor       = {Li Gong and
                  Jacques Stearn},
  title        = {A Non-Timestamped Authorization Model for Data Management Systems},
  booktitle    = {{CCS} '96, Proceedings of the 3rd {ACM} Conference on Computer and
                  Communications Security, New Delhi, India, March 14-16, 1996},
  pages        = {169--178},
  publisher    = {{ACM}},
  year         = {1996},
  url          = {https://doi.org/10.1145/238168.238211},
  doi          = {10.1145/238168.238211},
  timestamp    = {Tue, 10 Nov 2020 20:00:41 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BertinoJS96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Bolignano96,
  author       = {Dominique Bolignano},
  editor       = {Li Gong and
                  Jacques Stearn},
  title        = {An Approach to the Formal Verification of Cryptographic Protocols},
  booktitle    = {{CCS} '96, Proceedings of the 3rd {ACM} Conference on Computer and
                  Communications Security, New Delhi, India, March 14-16, 1996},
  pages        = {106--118},
  publisher    = {{ACM}},
  year         = {1996},
  url          = {https://doi.org/10.1145/238168.238196},
  doi          = {10.1145/238168.238196},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Bolignano96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CamenischPS96,
  author       = {Jan Camenisch and
                  Jean{-}Marc Piveteau and
                  Markus Stadler},
  editor       = {Li Gong and
                  Jacques Stearn},
  title        = {An Efficient Fair Payment System},
  booktitle    = {{CCS} '96, Proceedings of the 3rd {ACM} Conference on Computer and
                  Communications Security, New Delhi, India, March 14-16, 1996},
  pages        = {88--94},
  publisher    = {{ACM}},
  year         = {1996},
  url          = {https://doi.org/10.1145/238168.238193},
  doi          = {10.1145/238168.238193},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/CamenischPS96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Chuang96,
  author       = {Shaw{-}Cheng Chuang},
  editor       = {Li Gong and
                  Jacques Stearn},
  title        = {Securing {ATM} Networks},
  booktitle    = {{CCS} '96, Proceedings of the 3rd {ACM} Conference on Computer and
                  Communications Security, New Delhi, India, March 14-16, 1996},
  pages        = {19--30},
  publisher    = {{ACM}},
  year         = {1996},
  url          = {https://doi.org/10.1145/238168.238181},
  doi          = {10.1145/238168.238181},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Chuang96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Goldschlag96,
  author       = {David M. Goldschlag},
  editor       = {Li Gong and
                  Jacques Stearn},
  title        = {Several Secure Store and Forward Devices},
  booktitle    = {{CCS} '96, Proceedings of the 3rd {ACM} Conference on Computer and
                  Communications Security, New Delhi, India, March 14-16, 1996},
  pages        = {129--137},
  publisher    = {{ACM}},
  year         = {1996},
  url          = {https://doi.org/10.1145/238168.238200},
  doi          = {10.1145/238168.238200},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Goldschlag96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/JakobssonY96,
  author       = {Markus Jakobsson and
                  Moti Yung},
  editor       = {Li Gong and
                  Jacques Stearn},
  title        = {Revokable and Versatile Electronic Money (extended abstract)},
  booktitle    = {{CCS} '96, Proceedings of the 3rd {ACM} Conference on Computer and
                  Communications Security, New Delhi, India, March 14-16, 1996},
  pages        = {76--87},
  publisher    = {{ACM}},
  year         = {1996},
  url          = {https://doi.org/10.1145/238168.238191},
  doi          = {10.1145/238168.238191},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/JakobssonY96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LauLC96,
  author       = {Rynson W. H. Lau and
                  Kwok{-}Yan Lam and
                  Siu Leung Chung},
  editor       = {Li Gong and
                  Jacques Stearn},
  title        = {The Failure of Anti-Hacking Legislation: {A} Hong Kong Perspective},
  booktitle    = {{CCS} '96, Proceedings of the 3rd {ACM} Conference on Computer and
                  Communications Security, New Delhi, India, March 14-16, 1996},
  pages        = {62--67},
  publisher    = {{ACM}},
  year         = {1996},
  url          = {https://doi.org/10.1145/238168.238189},
  doi          = {10.1145/238168.238189},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LauLC96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MRaihiN96,
  author       = {David M'Ra{\"{\i}}hi and
                  David Naccache},
  editor       = {Li Gong and
                  Jacques Stearn},
  title        = {Batch Exponentiation: {A} Fast DLP-Based Signature Generation Strategy},
  booktitle    = {{CCS} '96, Proceedings of the 3rd {ACM} Conference on Computer and
                  Communications Security, New Delhi, India, March 14-16, 1996},
  pages        = {58--61},
  publisher    = {{ACM}},
  year         = {1996},
  url          = {https://doi.org/10.1145/238168.238187},
  doi          = {10.1145/238168.238187},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/MRaihiN96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MamboUO96,
  author       = {Masahiro Mambo and
                  Keisuke Usuda and
                  Eiji Okamoto},
  editor       = {Li Gong and
                  Jacques Stearn},
  title        = {Proxy Signatures for Delegating Signing Operation},
  booktitle    = {{CCS} '96, Proceedings of the 3rd {ACM} Conference on Computer and
                  Communications Security, New Delhi, India, March 14-16, 1996},
  pages        = {48--57},
  publisher    = {{ACM}},
  year         = {1996},
  url          = {https://doi.org/10.1145/238168.238185},
  doi          = {10.1145/238168.238185},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/MamboUO96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Matsumoto96,
  author       = {Tsutomu Matsumoto},
  editor       = {Li Gong and
                  Jacques Stearn},
  title        = {Human-Computer Cryptography: An Attempt},
  booktitle    = {{CCS} '96, Proceedings of the 3rd {ACM} Conference on Computer and
                  Communications Security, New Delhi, India, March 14-16, 1996},
  pages        = {68--75},
  publisher    = {{ACM}},
  year         = {1996},
  url          = {https://doi.org/10.1145/238168.238190},
  doi          = {10.1145/238168.238190},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Matsumoto96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MichelsPH96,
  author       = {Markus Michels and
                  Holger Petersen and
                  Patrick Horster},
  editor       = {Li Gong and
                  Jacques Stearn},
  title        = {Breaking and Repairing a Convertible Undeniable Signature Scheme},
  booktitle    = {{CCS} '96, Proceedings of the 3rd {ACM} Conference on Computer and
                  Communications Security, New Delhi, India, March 14-16, 1996},
  pages        = {148--152},
  publisher    = {{ACM}},
  year         = {1996},
  url          = {https://doi.org/10.1145/238168.238207},
  doi          = {10.1145/238168.238207},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/MichelsPH96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/NaorW96,
  author       = {Moni Naor and
                  Avishai Wool},
  editor       = {Li Gong and
                  Jacques Stearn},
  title        = {Access Control and Signatures via Quorum Secret Sharing},
  booktitle    = {{CCS} '96, Proceedings of the 3rd {ACM} Conference on Computer and
                  Communications Security, New Delhi, India, March 14-16, 1996},
  pages        = {157--168},
  publisher    = {{ACM}},
  year         = {1996},
  url          = {https://doi.org/10.1145/238168.238209},
  doi          = {10.1145/238168.238209},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/NaorW96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/RayBJM96,
  author       = {Indrajit Ray and
                  Elisa Bertino and
                  Sushil Jajodia and
                  Luigi V. Mancini},
  editor       = {Li Gong and
                  Jacques Stearn},
  title        = {An Advanced Commit Protocol for {MLS} Distributed Database Systems},
  booktitle    = {{CCS} '96, Proceedings of the 3rd {ACM} Conference on Computer and
                  Communications Security, New Delhi, India, March 14-16, 1996},
  pages        = {119--128},
  publisher    = {{ACM}},
  year         = {1996},
  url          = {https://doi.org/10.1145/238168.238198},
  doi          = {10.1145/238168.238198},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/RayBJM96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ReiterFLW96,
  author       = {Michael K. Reiter and
                  Matthew K. Franklin and
                  John B. Lacy and
                  Rebecca N. Wright},
  editor       = {Li Gong and
                  Jacques Stearn},
  title        = {The Omega Key Management Service},
  booktitle    = {{CCS} '96, Proceedings of the 3rd {ACM} Conference on Computer and
                  Communications Security, New Delhi, India, March 14-16, 1996},
  pages        = {38--47},
  publisher    = {{ACM}},
  year         = {1996},
  url          = {https://doi.org/10.1145/238168.238184},
  doi          = {10.1145/238168.238184},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ReiterFLW96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Samar96,
  author       = {Vipin Samar},
  editor       = {Li Gong and
                  Jacques Stearn},
  title        = {Unified Login with Pluggable Authentication Modules {(PAM)}},
  booktitle    = {{CCS} '96, Proceedings of the 3rd {ACM} Conference on Computer and
                  Communications Security, New Delhi, India, March 14-16, 1996},
  pages        = {1--10},
  publisher    = {{ACM}},
  year         = {1996},
  url          = {https://doi.org/10.1145/238168.238177},
  doi          = {10.1145/238168.238177},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Samar96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SteinerTW96,
  author       = {Michael Steiner and
                  Gene Tsudik and
                  Michael Waidner},
  editor       = {Li Gong and
                  Jacques Stearn},
  title        = {Diffie-Hellman Key Distribution Extended to Group Communication},
  booktitle    = {{CCS} '96, Proceedings of the 3rd {ACM} Conference on Computer and
                  Communications Security, New Delhi, India, March 14-16, 1996},
  pages        = {31--37},
  publisher    = {{ACM}},
  year         = {1996},
  url          = {https://doi.org/10.1145/238168.238182},
  doi          = {10.1145/238168.238182},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/SteinerTW96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/StubblebineW96,
  author       = {Stuart G. Stubblebine and
                  Rebecca N. Wright},
  editor       = {Li Gong and
                  Jacques Stearn},
  title        = {An Authentication Logic Supporting Synchronization, Revocation, and
                  Recency},
  booktitle    = {{CCS} '96, Proceedings of the 3rd {ACM} Conference on Computer and
                  Communications Security, New Delhi, India, March 14-16, 1996},
  pages        = {95--105},
  publisher    = {{ACM}},
  year         = {1996},
  url          = {https://doi.org/10.1145/238168.238195},
  doi          = {10.1145/238168.238195},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/StubblebineW96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SunS96,
  author       = {Hung{-}Min Sun and
                  Shiuh{-}Pyng Shieh},
  editor       = {Li Gong and
                  Jacques Stearn},
  title        = {Cryptanalysis of Private-Key Encryption Schemes Based on Burst-Error-Correcting
                  Codes},
  booktitle    = {{CCS} '96, Proceedings of the 3rd {ACM} Conference on Computer and
                  Communications Security, New Delhi, India, March 14-16, 1996},
  pages        = {153--156},
  publisher    = {{ACM}},
  year         = {1996},
  url          = {https://doi.org/10.1145/238168.238208},
  doi          = {10.1145/238168.238208},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/SunS96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Vaudenay96,
  author       = {Serge Vaudenay},
  editor       = {Li Gong and
                  Jacques Stearn},
  title        = {An Experiment on {DES} Statistical Cryptanalysis},
  booktitle    = {{CCS} '96, Proceedings of the 3rd {ACM} Conference on Computer and
                  Communications Security, New Delhi, India, March 14-16, 1996},
  pages        = {139--147},
  publisher    = {{ACM}},
  year         = {1996},
  url          = {https://doi.org/10.1145/238168.238206},
  doi          = {10.1145/238168.238206},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Vaudenay96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Wiegel96,
  author       = {Burkhard Wiegel},
  editor       = {Li Gong and
                  Jacques Stearn},
  title        = {Secure External References in Multimedia Email Messages},
  booktitle    = {{CCS} '96, Proceedings of the 3rd {ACM} Conference on Computer and
                  Communications Security, New Delhi, India, March 14-16, 1996},
  pages        = {11--18},
  publisher    = {{ACM}},
  year         = {1996},
  url          = {https://doi.org/10.1145/238168.238179},
  doi          = {10.1145/238168.238179},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Wiegel96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/1996,
  editor       = {Li Gong and
                  Jacques Stearn},
  title        = {{CCS} '96, Proceedings of the 3rd {ACM} Conference on Computer and
                  Communications Security, New Delhi, India, March 14-16, 1996},
  publisher    = {{ACM}},
  year         = {1996},
  url          = {http://dl.acm.org/citation.cfm?id=238168},
  isbn         = {0-89791-829-0},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/1996.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics