Search dblp for Publications

export results for "toc:db/conf/ccs/ccs1998.bht:"

 download as .bib file

@inproceedings{DBLP:conf/ccs/AtenieseST98,
  author       = {Giuseppe Ateniese and
                  Michael Steiner and
                  Gene Tsudik},
  editor       = {Li Gong and
                  Michael K. Reiter},
  title        = {Authenticated Group Key Agreement and Friends},
  booktitle    = {{CCS} '98, Proceedings of the 5th {ACM} Conference on Computer and
                  Communications Security, San Francisco, CA, USA, November 3-5, 1998},
  pages        = {17--26},
  publisher    = {{ACM}},
  year         = {1998},
  url          = {https://doi.org/10.1145/288090.288097},
  doi          = {10.1145/288090.288097},
  timestamp    = {Tue, 10 Nov 2020 20:00:11 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/AtenieseST98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BeckerW98,
  author       = {Klaus Becker and
                  Uta Wille},
  editor       = {Li Gong and
                  Michael K. Reiter},
  title        = {Communication Complexity of Group Key Distribution},
  booktitle    = {{CCS} '98, Proceedings of the 5th {ACM} Conference on Computer and
                  Communications Security, San Francisco, CA, USA, November 3-5, 1998},
  pages        = {1--6},
  publisher    = {{ACM}},
  year         = {1998},
  url          = {https://doi.org/10.1145/288090.288094},
  doi          = {10.1145/288090.288094},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BeckerW98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/EdjlaliAC98,
  author       = {Guy Edjlali and
                  Anurag Acharya and
                  Vipin Chaudhary},
  editor       = {Li Gong and
                  Michael K. Reiter},
  title        = {History-Based Access Control for Mobile Code},
  booktitle    = {{CCS} '98, Proceedings of the 5th {ACM} Conference on Computer and
                  Communications Security, San Francisco, CA, USA, November 3-5, 1998},
  pages        = {38--48},
  publisher    = {{ACM}},
  year         = {1998},
  url          = {https://doi.org/10.1145/288090.288102},
  doi          = {10.1145/288090.288102},
  timestamp    = {Fri, 28 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/EdjlaliAC98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/FosterKTT98,
  author       = {Ian T. Foster and
                  Carl Kesselman and
                  Gene Tsudik and
                  Steven Tuecke},
  editor       = {Li Gong and
                  Michael K. Reiter},
  title        = {A Security Architecture for Computational Grids},
  booktitle    = {{CCS} '98, Proceedings of the 5th {ACM} Conference on Computer and
                  Communications Security, San Francisco, CA, USA, November 3-5, 1998},
  pages        = {83--92},
  publisher    = {{ACM}},
  year         = {1998},
  url          = {https://doi.org/10.1145/288090.288111},
  doi          = {10.1145/288090.288111},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/FosterKTT98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GabberW98,
  author       = {Eran Gabber and
                  Avishai Wool},
  editor       = {Li Gong and
                  Michael K. Reiter},
  title        = {How to Prove Where You Are: Tracking the Location of Customer Equipment},
  booktitle    = {{CCS} '98, Proceedings of the 5th {ACM} Conference on Computer and
                  Communications Security, San Francisco, CA, USA, November 3-5, 1998},
  pages        = {142--149},
  publisher    = {{ACM}},
  year         = {1998},
  url          = {https://doi.org/10.1145/288090.288121},
  doi          = {10.1145/288090.288121},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/GabberW98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GennaroMR98,
  author       = {Rosario Gennaro and
                  Daniele Micciancio and
                  Tal Rabin},
  editor       = {Li Gong and
                  Michael K. Reiter},
  title        = {An Efficient Non-Interactive Statistical Zero-Knowledge Proof System
                  for Quasi-Safe Prime Products},
  booktitle    = {{CCS} '98, Proceedings of the 5th {ACM} Conference on Computer and
                  Communications Security, San Francisco, CA, USA, November 3-5, 1998},
  pages        = {67--72},
  publisher    = {{ACM}},
  year         = {1998},
  url          = {https://doi.org/10.1145/288090.288108},
  doi          = {10.1145/288090.288108},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/GennaroMR98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Goldberg98,
  author       = {Allen Goldberg},
  editor       = {Li Gong and
                  Michael K. Reiter},
  title        = {A Specification of Java Loading and Bytecode Verification},
  booktitle    = {{CCS} '98, Proceedings of the 5th {ACM} Conference on Computer and
                  Communications Security, San Francisco, CA, USA, November 3-5, 1998},
  pages        = {49--58},
  publisher    = {{ACM}},
  year         = {1998},
  url          = {https://doi.org/10.1145/288090.288104},
  doi          = {10.1145/288090.288104},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Goldberg98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HaleviK98,
  author       = {Shai Halevi and
                  Hugo Krawczyk},
  editor       = {Li Gong and
                  Michael K. Reiter},
  title        = {Public-Key Cryptography and Password Protocols},
  booktitle    = {{CCS} '98, Proceedings of the 5th {ACM} Conference on Computer and
                  Communications Security, San Francisco, CA, USA, November 3-5, 1998},
  pages        = {122--131},
  publisher    = {{ACM}},
  year         = {1998},
  url          = {https://doi.org/10.1145/288090.288118},
  doi          = {10.1145/288090.288118},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/HaleviK98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/JakobssonSHJ98,
  author       = {Markus Jakobsson and
                  Elizabeth A. M. Shriver and
                  Bruce Hillyer and
                  Ari Juels},
  editor       = {Li Gong and
                  Michael K. Reiter},
  title        = {A Practical Secure Physical Random Bit Generator},
  booktitle    = {{CCS} '98, Proceedings of the 5th {ACM} Conference on Computer and
                  Communications Security, San Francisco, CA, USA, November 3-5, 1998},
  pages        = {103--111},
  publisher    = {{ACM}},
  year         = {1998},
  url          = {https://doi.org/10.1145/288090.288114},
  doi          = {10.1145/288090.288114},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/JakobssonSHJ98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LaneB98,
  author       = {Terran Lane and
                  Carla E. Brodley},
  editor       = {Li Gong and
                  Michael K. Reiter},
  title        = {Temporal Sequence Learning and Data Reduction for Anomaly Detection},
  booktitle    = {{CCS} '98, Proceedings of the 5th {ACM} Conference on Computer and
                  Communications Security, San Francisco, CA, USA, November 3-5, 1998},
  pages        = {150--158},
  publisher    = {{ACM}},
  year         = {1998},
  url          = {https://doi.org/10.1145/288090.288122},
  doi          = {10.1145/288090.288122},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LaneB98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LincolnMMS98,
  author       = {Patrick Lincoln and
                  John C. Mitchell and
                  Mark Mitchell and
                  Andre Scedrov},
  editor       = {Li Gong and
                  Michael K. Reiter},
  title        = {A Probabilistic Poly-Time Framework for Protocol Analysis},
  booktitle    = {{CCS} '98, Proceedings of the 5th {ACM} Conference on Computer and
                  Communications Security, San Francisco, CA, USA, November 3-5, 1998},
  pages        = {112--121},
  publisher    = {{ACM}},
  year         = {1998},
  url          = {https://doi.org/10.1145/288090.288117},
  doi          = {10.1145/288090.288117},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LincolnMMS98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MazieresK98,
  author       = {David Mazi{\`{e}}res and
                  M. Frans Kaashoek},
  editor       = {Li Gong and
                  Michael K. Reiter},
  title        = {The Design, Implementation and Operation of an Email Pseudonym Server},
  booktitle    = {{CCS} '98, Proceedings of the 5th {ACM} Conference on Computer and
                  Communications Security, San Francisco, CA, USA, November 3-5, 1998},
  pages        = {27--36},
  publisher    = {{ACM}},
  year         = {1998},
  url          = {https://doi.org/10.1145/288090.288098},
  doi          = {10.1145/288090.288098},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/MazieresK98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/NaccacheS98,
  author       = {David Naccache and
                  Jacques Stern},
  editor       = {Li Gong and
                  Michael K. Reiter},
  title        = {A New Public Key Cryptosystem Based on Higher Residues},
  booktitle    = {{CCS} '98, Proceedings of the 5th {ACM} Conference on Computer and
                  Communications Security, San Francisco, CA, USA, November 3-5, 1998},
  pages        = {59--66},
  publisher    = {{ACM}},
  year         = {1998},
  url          = {https://doi.org/10.1145/288090.288106},
  doi          = {10.1145/288090.288106},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/NaccacheS98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SantisCP98,
  author       = {Alfredo De Santis and
                  Giovanni Di Crescenzo and
                  Giuseppe Persiano},
  editor       = {Li Gong and
                  Michael K. Reiter},
  title        = {Communication-Efficient Anonymous Group Identification},
  booktitle    = {{CCS} '98, Proceedings of the 5th {ACM} Conference on Computer and
                  Communications Security, San Francisco, CA, USA, November 3-5, 1998},
  pages        = {73--82},
  publisher    = {{ACM}},
  year         = {1998},
  url          = {https://doi.org/10.1145/288090.288110},
  doi          = {10.1145/288090.288110},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/SantisCP98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SchneierM98,
  author       = {Bruce Schneier and
                  Mudge},
  editor       = {Li Gong and
                  Michael K. Reiter},
  title        = {Cryptanalysis of Microsoft's Point-to-Point Tunneling Protocol {(PPTP)}},
  booktitle    = {{CCS} '98, Proceedings of the 5th {ACM} Conference on Computer and
                  Communications Security, San Francisco, CA, USA, November 3-5, 1998},
  pages        = {132--141},
  publisher    = {{ACM}},
  year         = {1998},
  url          = {https://doi.org/10.1145/288090.288119},
  doi          = {10.1145/288090.288119},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/SchneierM98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Syverson98,
  author       = {Paul F. Syverson},
  editor       = {Li Gong and
                  Michael K. Reiter},
  title        = {Anonymity on the Internet (Panel)},
  booktitle    = {{CCS} '98, Proceedings of the 5th {ACM} Conference on Computer and
                  Communications Security, San Francisco, CA, USA, November 3-5, 1998},
  pages        = {37},
  publisher    = {{ACM}},
  year         = {1998},
  url          = {https://doi.org/10.1145/288090.288100},
  doi          = {10.1145/288090.288100},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Syverson98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Wool98,
  author       = {Avishai Wool},
  editor       = {Li Gong and
                  Michael K. Reiter},
  title        = {Key Management for Encrypted broadcast},
  booktitle    = {{CCS} '98, Proceedings of the 5th {ACM} Conference on Computer and
                  Communications Security, San Francisco, CA, USA, November 3-5, 1998},
  pages        = {7--16},
  publisher    = {{ACM}},
  year         = {1998},
  url          = {https://doi.org/10.1145/288090.288096},
  doi          = {10.1145/288090.288096},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Wool98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/XuS98,
  author       = {Jun Xu and
                  Mukesh Singhal},
  editor       = {Li Gong and
                  Michael K. Reiter},
  title        = {Design of a High-Performance {ATM} Firewall},
  booktitle    = {{CCS} '98, Proceedings of the 5th {ACM} Conference on Computer and
                  Communications Security, San Francisco, CA, USA, November 3-5, 1998},
  pages        = {93--102},
  publisher    = {{ACM}},
  year         = {1998},
  url          = {https://doi.org/10.1145/288090.288113},
  doi          = {10.1145/288090.288113},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/XuS98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/1998,
  editor       = {Li Gong and
                  Michael K. Reiter},
  title        = {{CCS} '98, Proceedings of the 5th {ACM} Conference on Computer and
                  Communications Security, San Francisco, CA, USA, November 3-5, 1998},
  publisher    = {{ACM}},
  year         = {1998},
  url          = {http://dl.acm.org/citation.cfm?id=288090},
  isbn         = {1-58113-007-4},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/1998.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics