CCS A*

21 papers

YearTitle / Authors
1996A Non-Timestamped Authorization Model for Data Management Systems.
Elisa Bertino, Sushil Jajodia, Pierangela Samarati
1996Access Control and Signatures via Quorum Secret Sharing.
Moni Naor, Avishai Wool
1996An Advanced Commit Protocol for MLS Distributed Database Systems.
Indrajit Ray, Elisa Bertino, Sushil Jajodia, Luigi V. Mancini
1996An Approach to the Formal Verification of Cryptographic Protocols.
Dominique Bolignano
1996An Authentication Logic Supporting Synchronization, Revocation, and Recency.
Stuart G. Stubblebine, Rebecca N. Wright
1996An Efficient Fair Payment System.
Jan Camenisch, Jean-Marc Piveteau, Markus Stadler
1996An Experiment on DES Statistical Cryptanalysis.
Serge Vaudenay
1996Batch Exponentiation: A Fast DLP-Based Signature Generation Strategy.
David M'Raïhi, David Naccache
1996Breaking and Repairing a Convertible Undeniable Signature Scheme.
Markus Michels, Holger Petersen, Patrick Horster
1996CCS '96, Proceedings of the 3rd ACM Conference on Computer and Communications Security, New Delhi, India, March 14-16, 1996.
Li Gong, Jacques Stearn
1996Cryptanalysis of Private-Key Encryption Schemes Based on Burst-Error-Correcting Codes.
Hung-Min Sun, Shiuh-Pyng Shieh
1996Diffie-Hellman Key Distribution Extended to Group Communication.
Michael Steiner, Gene Tsudik, Michael Waidner
1996Human-Computer Cryptography: An Attempt.
Tsutomu Matsumoto
1996Proxy Signatures for Delegating Signing Operation.
Masahiro Mambo, Keisuke Usuda, Eiji Okamoto
1996Revokable and Versatile Electronic Money (extended abstract).
Markus Jakobsson, Moti Yung
1996Secure External References in Multimedia Email Messages.
Burkhard Wiegel
1996Securing ATM Networks.
Shaw-Cheng Chuang
1996Several Secure Store and Forward Devices.
David M. Goldschlag
1996The Failure of Anti-Hacking Legislation: A Hong Kong Perspective.
Rynson W. H. Lau, Kwok-Yan Lam, Siu Leung Chung
1996The Omega Key Management Service.
Michael K. Reiter, Matthew K. Franklin, John B. Lacy, Rebecca N. Wright
1996Unified Login with Pluggable Authentication Modules (PAM).
Vipin Samar