CCS A*

31 papers

YearTitle / Authors
1993A Cryptographic File System for UNIX.
Matt Blaze
1993A Framework for Distributed Authorization.
Thomas Y. C. Woo, Simon S. Lam
1993A New Signature Scheme Based on the DSA Giving Message Recovery.
Kaisa Nyberg, Rainer A. Rueppel
1993A Particular Solution to Provide Secure Communications in an Ethernet Environment.
Miguel Soriano, Jordi Forné, Francisco Recacha, José L. Melús
1993A Pump for Rapid, Reliable, Secure Communication.
Myong H. Kang, Ira S. Moskowitz
1993Adding Time to a Logic of Authentication.
Paul F. Syverson
1993Analysis of an Algorithm for Distributed Recognition and Accountability.
Calvin Ko, Deborah A. Frincke, Terrance Goan, Todd L. Heberlein, Karl N. Levitt, Biswanath Mukherjee, Christopher Wee
1993Augmented Encrypted Key Exchange: A Password-Based Protocol Secure against Dictionary Attacks and Password File Compromise.
Steven M. Bellovin, Michael Merritt
1993Authorizations in Relational Database Management Systems.
Elisa Bertino, Pierangela Samarati, Sushil Jajodia
1993CCS '93, Proceedings of the 1st ACM Conference on Computer and Communications Security, Fairfax, Virginia, USA, November 3-5, 1993.
Dorothy E. Denning, Raymond Pyle, Ravi Ganesan, Ravi S. Sandhu, Victoria Ashby
1993Cryptanalysis and Protocol Failures (abstract).
Gustavus J. Simmons
1993Denial of Service.
Roger M. Needham
1993Design of the Commercial Data Masking Facility Data Privacy Algorithm.
Don B. Johnson, Stephen M. Matyas, An V. Le, John D. Wilkins
1993Differential Cryptanalysis of Hash Functions Based on Block Ciphers.
Bart Preneel, René Govaerts, Joos Vandewalle
1993Digital Signatures: Can They be Accepted as Legal Signatures in EDI?
Patrick W. Brown
1993Does Licensing Require New Access Control Techniques?
Ralf C. Hauser
1993Extending Cryptographic Logics of Belief to Key Agreement Protocols.
Paul C. van Oorschot
1993High Assurance Discretionary Access Control for Object Bases.
Elisa Bertino, Pierangela Samarati, Sushil Jajodia
1993Integration of DCE and Local Registries: Design Approaches.
Ping Lin, C. Sekar Chandersekaran
1993Lower Bounds on Messages and Rounds for Network Authentication Protocols.
Li Gong
1993NetCash: A Design for Practical Electronic Currency on the Internet.
Gennady Medvinsky, B. Clifford Neuman
1993On Simple and Secure Key Distribution.
Gene Tsudik, Els Van Herreweghen
1993Optimality of Multi-Domain Protocols.
Raphael Yahalom
1993Random Oracles are Practical: A Paradigm for Designing Efficient Protocols.
Mihir Bellare, Phillip Rogaway
1993Securing a Global Village and Its Resources: Baseline Security for Interconnected Signaling System #7 Telecommunications Networks.
Hank M. Kluepfel
1993Security Planning for Personal Communications.
Dan Brown
1993Sorting Out Signature Schemes.
Birgit Pfitzmann
1993Systematic Generation of Cryptographically Robust S-Boxes.
Jennifer Seberry, Xian-Mo Zhang, Yuliang Zheng
1993Towards Practical "Proven Secure" Authenticated Key Distribution.
Yvo Desmedt, Mike Burmester
1993Verifiable Secret Sharing for Monotone Access Structures.
Thomas Beth, Hans-Joachim Knobloch, Marcus Otten
1993Why Cryptosystems Fail.
Ross J. Anderson