CCS A*

19 papers

YearTitle / Authors
1998A New Public Key Cryptosystem Based on Higher Residues.
David Naccache, Jacques Stern
1998A Practical Secure Physical Random Bit Generator.
Markus Jakobsson, Elizabeth A. M. Shriver, Bruce Hillyer, Ari Juels
1998A Probabilistic Poly-Time Framework for Protocol Analysis.
Patrick Lincoln, John C. Mitchell, Mark Mitchell, Andre Scedrov
1998A Security Architecture for Computational Grids.
Ian T. Foster, Carl Kesselman, Gene Tsudik, Steven Tuecke
1998A Specification of Java Loading and Bytecode Verification.
Allen Goldberg
1998An Efficient Non-Interactive Statistical Zero-Knowledge Proof System for Quasi-Safe Prime Products.
Rosario Gennaro, Daniele Micciancio, Tal Rabin
1998Anonymity on the Internet (Panel).
Paul F. Syverson
1998Authenticated Group Key Agreement and Friends.
Giuseppe Ateniese, Michael Steiner, Gene Tsudik
1998CCS '98, Proceedings of the 5th ACM Conference on Computer and Communications Security, San Francisco, CA, USA, November 3-5, 1998.
Li Gong, Michael K. Reiter
1998Communication Complexity of Group Key Distribution.
Klaus Becker, Uta Wille
1998Communication-Efficient Anonymous Group Identification.
Alfredo De Santis, Giovanni Di Crescenzo, Giuseppe Persiano
1998Cryptanalysis of Microsoft's Point-to-Point Tunneling Protocol (PPTP).
Bruce Schneier, Mudge
1998Design of a High-Performance ATM Firewall.
Jun Xu, Mukesh Singhal
1998History-Based Access Control for Mobile Code.
Guy Edjlali, Anurag Acharya, Vipin Chaudhary
1998How to Prove Where You Are: Tracking the Location of Customer Equipment.
Eran Gabber, Avishai Wool
1998Key Management for Encrypted broadcast.
Avishai Wool
1998Public-Key Cryptography and Password Protocols.
Shai Halevi, Hugo Krawczyk
1998Temporal Sequence Learning and Data Reduction for Anomaly Detection.
Terran Lane, Carla E. Brodley
1998The Design, Implementation and Operation of an Email Pseudonym Server.
David Mazières, M. Frans Kaashoek