Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/ccs/ccs1998.bht:"
@inproceedings{DBLP:conf/ccs/AtenieseST98, author = {Giuseppe Ateniese and Michael Steiner and Gene Tsudik}, editor = {Li Gong and Michael K. Reiter}, title = {Authenticated Group Key Agreement and Friends}, booktitle = {{CCS} '98, Proceedings of the 5th {ACM} Conference on Computer and Communications Security, San Francisco, CA, USA, November 3-5, 1998}, pages = {17--26}, publisher = {{ACM}}, year = {1998}, url = {https://doi.org/10.1145/288090.288097}, doi = {10.1145/288090.288097}, timestamp = {Tue, 10 Nov 2020 20:00:11 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AtenieseST98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BeckerW98, author = {Klaus Becker and Uta Wille}, editor = {Li Gong and Michael K. Reiter}, title = {Communication Complexity of Group Key Distribution}, booktitle = {{CCS} '98, Proceedings of the 5th {ACM} Conference on Computer and Communications Security, San Francisco, CA, USA, November 3-5, 1998}, pages = {1--6}, publisher = {{ACM}}, year = {1998}, url = {https://doi.org/10.1145/288090.288094}, doi = {10.1145/288090.288094}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BeckerW98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/EdjlaliAC98, author = {Guy Edjlali and Anurag Acharya and Vipin Chaudhary}, editor = {Li Gong and Michael K. Reiter}, title = {History-Based Access Control for Mobile Code}, booktitle = {{CCS} '98, Proceedings of the 5th {ACM} Conference on Computer and Communications Security, San Francisco, CA, USA, November 3-5, 1998}, pages = {38--48}, publisher = {{ACM}}, year = {1998}, url = {https://doi.org/10.1145/288090.288102}, doi = {10.1145/288090.288102}, timestamp = {Fri, 28 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/EdjlaliAC98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/FosterKTT98, author = {Ian T. Foster and Carl Kesselman and Gene Tsudik and Steven Tuecke}, editor = {Li Gong and Michael K. Reiter}, title = {A Security Architecture for Computational Grids}, booktitle = {{CCS} '98, Proceedings of the 5th {ACM} Conference on Computer and Communications Security, San Francisco, CA, USA, November 3-5, 1998}, pages = {83--92}, publisher = {{ACM}}, year = {1998}, url = {https://doi.org/10.1145/288090.288111}, doi = {10.1145/288090.288111}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/FosterKTT98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GabberW98, author = {Eran Gabber and Avishai Wool}, editor = {Li Gong and Michael K. Reiter}, title = {How to Prove Where You Are: Tracking the Location of Customer Equipment}, booktitle = {{CCS} '98, Proceedings of the 5th {ACM} Conference on Computer and Communications Security, San Francisco, CA, USA, November 3-5, 1998}, pages = {142--149}, publisher = {{ACM}}, year = {1998}, url = {https://doi.org/10.1145/288090.288121}, doi = {10.1145/288090.288121}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GabberW98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GennaroMR98, author = {Rosario Gennaro and Daniele Micciancio and Tal Rabin}, editor = {Li Gong and Michael K. Reiter}, title = {An Efficient Non-Interactive Statistical Zero-Knowledge Proof System for Quasi-Safe Prime Products}, booktitle = {{CCS} '98, Proceedings of the 5th {ACM} Conference on Computer and Communications Security, San Francisco, CA, USA, November 3-5, 1998}, pages = {67--72}, publisher = {{ACM}}, year = {1998}, url = {https://doi.org/10.1145/288090.288108}, doi = {10.1145/288090.288108}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GennaroMR98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Goldberg98, author = {Allen Goldberg}, editor = {Li Gong and Michael K. Reiter}, title = {A Specification of Java Loading and Bytecode Verification}, booktitle = {{CCS} '98, Proceedings of the 5th {ACM} Conference on Computer and Communications Security, San Francisco, CA, USA, November 3-5, 1998}, pages = {49--58}, publisher = {{ACM}}, year = {1998}, url = {https://doi.org/10.1145/288090.288104}, doi = {10.1145/288090.288104}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Goldberg98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HaleviK98, author = {Shai Halevi and Hugo Krawczyk}, editor = {Li Gong and Michael K. Reiter}, title = {Public-Key Cryptography and Password Protocols}, booktitle = {{CCS} '98, Proceedings of the 5th {ACM} Conference on Computer and Communications Security, San Francisco, CA, USA, November 3-5, 1998}, pages = {122--131}, publisher = {{ACM}}, year = {1998}, url = {https://doi.org/10.1145/288090.288118}, doi = {10.1145/288090.288118}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HaleviK98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JakobssonSHJ98, author = {Markus Jakobsson and Elizabeth A. M. Shriver and Bruce Hillyer and Ari Juels}, editor = {Li Gong and Michael K. Reiter}, title = {A Practical Secure Physical Random Bit Generator}, booktitle = {{CCS} '98, Proceedings of the 5th {ACM} Conference on Computer and Communications Security, San Francisco, CA, USA, November 3-5, 1998}, pages = {103--111}, publisher = {{ACM}}, year = {1998}, url = {https://doi.org/10.1145/288090.288114}, doi = {10.1145/288090.288114}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/JakobssonSHJ98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LaneB98, author = {Terran Lane and Carla E. Brodley}, editor = {Li Gong and Michael K. Reiter}, title = {Temporal Sequence Learning and Data Reduction for Anomaly Detection}, booktitle = {{CCS} '98, Proceedings of the 5th {ACM} Conference on Computer and Communications Security, San Francisco, CA, USA, November 3-5, 1998}, pages = {150--158}, publisher = {{ACM}}, year = {1998}, url = {https://doi.org/10.1145/288090.288122}, doi = {10.1145/288090.288122}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LaneB98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LincolnMMS98, author = {Patrick Lincoln and John C. Mitchell and Mark Mitchell and Andre Scedrov}, editor = {Li Gong and Michael K. Reiter}, title = {A Probabilistic Poly-Time Framework for Protocol Analysis}, booktitle = {{CCS} '98, Proceedings of the 5th {ACM} Conference on Computer and Communications Security, San Francisco, CA, USA, November 3-5, 1998}, pages = {112--121}, publisher = {{ACM}}, year = {1998}, url = {https://doi.org/10.1145/288090.288117}, doi = {10.1145/288090.288117}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LincolnMMS98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MazieresK98, author = {David Mazi{\`{e}}res and M. Frans Kaashoek}, editor = {Li Gong and Michael K. Reiter}, title = {The Design, Implementation and Operation of an Email Pseudonym Server}, booktitle = {{CCS} '98, Proceedings of the 5th {ACM} Conference on Computer and Communications Security, San Francisco, CA, USA, November 3-5, 1998}, pages = {27--36}, publisher = {{ACM}}, year = {1998}, url = {https://doi.org/10.1145/288090.288098}, doi = {10.1145/288090.288098}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MazieresK98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/NaccacheS98, author = {David Naccache and Jacques Stern}, editor = {Li Gong and Michael K. Reiter}, title = {A New Public Key Cryptosystem Based on Higher Residues}, booktitle = {{CCS} '98, Proceedings of the 5th {ACM} Conference on Computer and Communications Security, San Francisco, CA, USA, November 3-5, 1998}, pages = {59--66}, publisher = {{ACM}}, year = {1998}, url = {https://doi.org/10.1145/288090.288106}, doi = {10.1145/288090.288106}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/NaccacheS98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SantisCP98, author = {Alfredo De Santis and Giovanni Di Crescenzo and Giuseppe Persiano}, editor = {Li Gong and Michael K. Reiter}, title = {Communication-Efficient Anonymous Group Identification}, booktitle = {{CCS} '98, Proceedings of the 5th {ACM} Conference on Computer and Communications Security, San Francisco, CA, USA, November 3-5, 1998}, pages = {73--82}, publisher = {{ACM}}, year = {1998}, url = {https://doi.org/10.1145/288090.288110}, doi = {10.1145/288090.288110}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/SantisCP98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SchneierM98, author = {Bruce Schneier and Mudge}, editor = {Li Gong and Michael K. Reiter}, title = {Cryptanalysis of Microsoft's Point-to-Point Tunneling Protocol {(PPTP)}}, booktitle = {{CCS} '98, Proceedings of the 5th {ACM} Conference on Computer and Communications Security, San Francisco, CA, USA, November 3-5, 1998}, pages = {132--141}, publisher = {{ACM}}, year = {1998}, url = {https://doi.org/10.1145/288090.288119}, doi = {10.1145/288090.288119}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SchneierM98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Syverson98, author = {Paul F. Syverson}, editor = {Li Gong and Michael K. Reiter}, title = {Anonymity on the Internet (Panel)}, booktitle = {{CCS} '98, Proceedings of the 5th {ACM} Conference on Computer and Communications Security, San Francisco, CA, USA, November 3-5, 1998}, pages = {37}, publisher = {{ACM}}, year = {1998}, url = {https://doi.org/10.1145/288090.288100}, doi = {10.1145/288090.288100}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Syverson98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Wool98, author = {Avishai Wool}, editor = {Li Gong and Michael K. Reiter}, title = {Key Management for Encrypted broadcast}, booktitle = {{CCS} '98, Proceedings of the 5th {ACM} Conference on Computer and Communications Security, San Francisco, CA, USA, November 3-5, 1998}, pages = {7--16}, publisher = {{ACM}}, year = {1998}, url = {https://doi.org/10.1145/288090.288096}, doi = {10.1145/288090.288096}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Wool98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/XuS98, author = {Jun Xu and Mukesh Singhal}, editor = {Li Gong and Michael K. Reiter}, title = {Design of a High-Performance {ATM} Firewall}, booktitle = {{CCS} '98, Proceedings of the 5th {ACM} Conference on Computer and Communications Security, San Francisco, CA, USA, November 3-5, 1998}, pages = {93--102}, publisher = {{ACM}}, year = {1998}, url = {https://doi.org/10.1145/288090.288113}, doi = {10.1145/288090.288113}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/XuS98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/1998, editor = {Li Gong and Michael K. Reiter}, title = {{CCS} '98, Proceedings of the 5th {ACM} Conference on Computer and Communications Security, San Francisco, CA, USA, November 3-5, 1998}, publisher = {{ACM}}, year = {1998}, url = {http://dl.acm.org/citation.cfm?id=288090}, isbn = {1-58113-007-4}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/1998.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.