Search dblp for Publications

export results for "toc:db/conf/ccs/ccs1999.bht:"

 download as .bib file

@inproceedings{DBLP:conf/ccs/AielloRS99,
  author       = {William Aiello and
                  Aviel D. Rubin and
                  Martin Strauss},
  editor       = {Juzar Motiwalla and
                  Gene Tsudik},
  title        = {Using Smartcards to Secure a Personalized Gambling Device},
  booktitle    = {{CCS} '99, Proceedings of the 6th {ACM} Conference on Computer and
                  Communications Security, Singapore, November 1-4, 1999},
  pages        = {128--137},
  publisher    = {{ACM}},
  year         = {1999},
  url          = {https://doi.org/10.1145/319709.319727},
  doi          = {10.1145/319709.319727},
  timestamp    = {Tue, 10 Nov 2020 20:00:25 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/AielloRS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AppelF99,
  author       = {Andrew W. Appel and
                  Edward W. Felten},
  editor       = {Juzar Motiwalla and
                  Gene Tsudik},
  title        = {Proof-Carrying Authentication},
  booktitle    = {{CCS} '99, Proceedings of the 6th {ACM} Conference on Computer and
                  Communications Security, Singapore, November 1-4, 1999},
  pages        = {52--62},
  publisher    = {{ACM}},
  year         = {1999},
  url          = {https://doi.org/10.1145/319709.319718},
  doi          = {10.1145/319709.319718},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/AppelF99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Ateniese99,
  author       = {Giuseppe Ateniese},
  editor       = {Juzar Motiwalla and
                  Gene Tsudik},
  title        = {Efficient Verifiable Encryption (and Fair Exchange) of Digital Signatures},
  booktitle    = {{CCS} '99, Proceedings of the 6th {ACM} Conference on Computer and
                  Communications Security, Singapore, November 1-4, 1999},
  pages        = {138--146},
  publisher    = {{ACM}},
  year         = {1999},
  url          = {https://doi.org/10.1145/319709.319728},
  doi          = {10.1145/319709.319728},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Ateniese99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Axelsson99,
  author       = {Stefan Axelsson},
  editor       = {Juzar Motiwalla and
                  Gene Tsudik},
  title        = {The Base-Rate Fallacy and Its Implications for the Difficulty of Intrusion
                  Detection},
  booktitle    = {{CCS} '99, Proceedings of the 6th {ACM} Conference on Computer and
                  Communications Security, Singapore, November 1-4, 1999},
  pages        = {1--7},
  publisher    = {{ACM}},
  year         = {1999},
  url          = {https://doi.org/10.1145/319709.319710},
  doi          = {10.1145/319709.319710},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Axelsson99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BarakHNS99,
  author       = {Boaz Barak and
                  Amir Herzberg and
                  Dalit Naor and
                  Eldad Shai},
  editor       = {Juzar Motiwalla and
                  Gene Tsudik},
  title        = {The Proactive Security Toolkit and Applications},
  booktitle    = {{CCS} '99, Proceedings of the 6th {ACM} Conference on Computer and
                  Communications Security, Singapore, November 1-4, 1999},
  pages        = {18--27},
  publisher    = {{ACM}},
  year         = {1999},
  url          = {https://doi.org/10.1145/319709.319713},
  doi          = {10.1145/319709.319713},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BarakHNS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BonehF99,
  author       = {Dan Boneh and
                  Matthew K. Franklin},
  editor       = {Juzar Motiwalla and
                  Gene Tsudik},
  title        = {Anonymous Authentication with Subset Queries (extended abstract)},
  booktitle    = {{CCS} '99, Proceedings of the 6th {ACM} Conference on Computer and
                  Communications Security, Singapore, November 1-4, 1999},
  pages        = {113--119},
  publisher    = {{ACM}},
  year         = {1999},
  url          = {https://doi.org/10.1145/319709.319725},
  doi          = {10.1145/319709.319725},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BonehF99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BoyarskyP99,
  author       = {Maurizio Kliban Boyarsky},
  editor       = {Juzar Motiwalla and
                  Gene Tsudik},
  title        = {Public-Key Cryptography and Password Protocols: The Multi-User Case},
  booktitle    = {{CCS} '99, Proceedings of the 6th {ACM} Conference on Computer and
                  Communications Security, Singapore, November 1-4, 1999},
  pages        = {63--72},
  publisher    = {{ACM}},
  year         = {1999},
  url          = {https://doi.org/10.1145/319709.319719},
  doi          = {10.1145/319709.319719},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BoyarskyP99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Cachin99,
  author       = {Christian Cachin},
  editor       = {Juzar Motiwalla and
                  Gene Tsudik},
  title        = {Efficient Private Bidding and Auctions with an Oblivious Third Party},
  booktitle    = {{CCS} '99, Proceedings of the 6th {ACM} Conference on Computer and
                  Communications Security, Singapore, November 1-4, 1999},
  pages        = {120--127},
  publisher    = {{ACM}},
  year         = {1999},
  url          = {https://doi.org/10.1145/319709.319726},
  doi          = {10.1145/319709.319726},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Cachin99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CramerS99,
  author       = {Ronald Cramer and
                  Victor Shoup},
  editor       = {Juzar Motiwalla and
                  Gene Tsudik},
  title        = {Signature Schemes Based on the Strong {RSA} Assumption},
  booktitle    = {{CCS} '99, Proceedings of the 6th {ACM} Conference on Computer and
                  Communications Security, Singapore, November 1-4, 1999},
  pages        = {46--51},
  publisher    = {{ACM}},
  year         = {1999},
  url          = {https://doi.org/10.1145/319709.319716},
  doi          = {10.1145/319709.319716},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/CramerS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/JuelsW99,
  author       = {Ari Juels and
                  Martin Wattenberg},
  editor       = {Juzar Motiwalla and
                  Gene Tsudik},
  title        = {A Fuzzy Commitment Scheme},
  booktitle    = {{CCS} '99, Proceedings of the 6th {ACM} Conference on Computer and
                  Communications Security, Singapore, November 1-4, 1999},
  pages        = {28--36},
  publisher    = {{ACM}},
  year         = {1999},
  url          = {https://doi.org/10.1145/319709.319714},
  doi          = {10.1145/319709.319714},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/JuelsW99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MayerY99,
  author       = {Alain J. Mayer and
                  Moti Yung},
  editor       = {Juzar Motiwalla and
                  Gene Tsudik},
  title        = {Secure Protocol Transformation via "Expansion": From Two-Party to
                  Groups},
  booktitle    = {{CCS} '99, Proceedings of the 6th {ACM} Conference on Computer and
                  Communications Security, Singapore, November 1-4, 1999},
  pages        = {83--92},
  publisher    = {{ACM}},
  year         = {1999},
  url          = {https://doi.org/10.1145/319709.319721},
  doi          = {10.1145/319709.319721},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/MayerY99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MolvaP99,
  author       = {Refik Molva and
                  Alain Pannetrat},
  editor       = {Juzar Motiwalla and
                  Gene Tsudik},
  title        = {Scalable Multicast Security in Dynamic Groups},
  booktitle    = {{CCS} '99, Proceedings of the 6th {ACM} Conference on Computer and
                  Communications Security, Singapore, November 1-4, 1999},
  pages        = {101--112},
  publisher    = {{ACM}},
  year         = {1999},
  url          = {https://doi.org/10.1145/319709.319723},
  doi          = {10.1145/319709.319723},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/MolvaP99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MonroseRW99,
  author       = {Fabian Monrose and
                  Michael K. Reiter and
                  Susanne Wetzel},
  editor       = {Juzar Motiwalla and
                  Gene Tsudik},
  title        = {Password Hardening Based on Keystroke Dynamics},
  booktitle    = {{CCS} '99, Proceedings of the 6th {ACM} Conference on Computer and
                  Communications Security, Singapore, November 1-4, 1999},
  pages        = {73--82},
  publisher    = {{ACM}},
  year         = {1999},
  url          = {https://doi.org/10.1145/319709.319720},
  doi          = {10.1145/319709.319720},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/MonroseRW99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/PoupardS99,
  author       = {Guillaume Poupard and
                  Jacques Stern},
  editor       = {Juzar Motiwalla and
                  Gene Tsudik},
  title        = {On the Fly Signatures Based on Factoring},
  booktitle    = {{CCS} '99, Proceedings of the 6th {ACM} Conference on Computer and
                  Communications Security, Singapore, November 1-4, 1999},
  pages        = {37--45},
  publisher    = {{ACM}},
  year         = {1999},
  url          = {https://doi.org/10.1145/319709.319715},
  doi          = {10.1145/319709.319715},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/PoupardS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Rohatgi99,
  author       = {Pankaj Rohatgi},
  editor       = {Juzar Motiwalla and
                  Gene Tsudik},
  title        = {A Compact and Fast Hybrid Signature Scheme for Multicast Packet Authentication},
  booktitle    = {{CCS} '99, Proceedings of the 6th {ACM} Conference on Computer and
                  Communications Security, Singapore, November 1-4, 1999},
  pages        = {93--100},
  publisher    = {{ACM}},
  year         = {1999},
  url          = {https://doi.org/10.1145/319709.319722},
  doi          = {10.1145/319709.319722},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Rohatgi99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SekarGVS99,
  author       = {R. Sekar and
                  Y. Guang and
                  S. Verma and
                  T. Shanbhag},
  editor       = {Juzar Motiwalla and
                  Gene Tsudik},
  title        = {A High-Performance Network Intrusion Detection System},
  booktitle    = {{CCS} '99, Proceedings of the 6th {ACM} Conference on Computer and
                  Communications Security, Singapore, November 1-4, 1999},
  pages        = {8--17},
  publisher    = {{ACM}},
  year         = {1999},
  url          = {https://doi.org/10.1145/319709.319712},
  doi          = {10.1145/319709.319712},
  timestamp    = {Thu, 18 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/SekarGVS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/1999,
  editor       = {Juzar Motiwalla and
                  Gene Tsudik},
  title        = {{CCS} '99, Proceedings of the 6th {ACM} Conference on Computer and
                  Communications Security, Singapore, November 1-4, 1999},
  publisher    = {{ACM}},
  year         = {1999},
  url          = {http://dl.acm.org/citation.cfm?id=319709},
  isbn         = {1-58113-148-8},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/1999.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics