Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/spw/spw96.bht:"
@proceedings{DBLP:conf/spw/1996, editor = {T. Mark A. Lomas}, title = {Security Protocols, International Workshop, Cambridge, United Kingdom, April 10-12, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1189}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/3-540-62494-5}, doi = {10.1007/3-540-62494-5}, isbn = {3-540-62494-5}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/1996.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/AndersonMS96, author = {Ross J. Anderson and Charalampos Manifavas and Chris Sutherland}, editor = {T. Mark A. Lomas}, title = {NetCard - {A} Practical Electronic-Cash System}, booktitle = {Security Protocols, International Workshop, Cambridge, United Kingdom, April 10-12, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1189}, pages = {49--57}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-62494-5\_4}, doi = {10.1007/3-540-62494-5\_4}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spw/AndersonMS96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/BurmesterD96, author = {Mike Burmester and Yvo Desmedt}, editor = {T. Mark A. Lomas}, title = {Efficient and Secure Conference-Key Distribution}, booktitle = {Security Protocols, International Workshop, Cambridge, United Kingdom, April 10-12, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1189}, pages = {119--129}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-62494-5\_12}, doi = {10.1007/3-540-62494-5\_12}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/BurmesterD96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/ChenGM96, author = {Liqun Chen and Dieter Gollmann and Chris J. Mitchell}, editor = {T. Mark A. Lomas}, title = {Key Escrow in Mutually Mistrusting Domains}, booktitle = {Security Protocols, International Workshop, Cambridge, United Kingdom, April 10-12, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1189}, pages = {139--153}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-62494-5\_14}, doi = {10.1007/3-540-62494-5\_14}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/ChenGM96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/ChristiansonH96, author = {Bruce Christianson and William S. Harbison}, editor = {T. Mark A. Lomas}, title = {Why Isn't Trust Transitive?}, booktitle = {Security Protocols, International Workshop, Cambridge, United Kingdom, April 10-12, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1189}, pages = {171--176}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-62494-5\_16}, doi = {10.1007/3-540-62494-5\_16}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/ChristiansonH96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/ChuangG96, author = {Shaw{-}Cheng Chuang and David J. Greaves}, editor = {T. Mark A. Lomas}, title = {Securing the Residential Asynchronous Transfer Mode Networks}, booktitle = {Security Protocols, International Workshop, Cambridge, United Kingdom, April 10-12, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1189}, pages = {177--196}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-62494-5\_17}, doi = {10.1007/3-540-62494-5\_17}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/ChuangG96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/CramerDP96, author = {Ronald Cramer and Ivan Damg{\aa}rd and Torben P. Pedersen}, editor = {T. Mark A. Lomas}, title = {Efficient and Provable Security Amplifications}, booktitle = {Security Protocols, International Workshop, Cambridge, United Kingdom, April 10-12, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1189}, pages = {101--109}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-62494-5\_9}, doi = {10.1007/3-540-62494-5\_9}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/CramerDP96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/CrispoL96, author = {Bruno Crispo and T. Mark A. Lomas}, editor = {T. Mark A. Lomas}, title = {A Certification Scheme for Electronic Commerce}, booktitle = {Security Protocols, International Workshop, Cambridge, United Kingdom, April 10-12, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1189}, pages = {19--32}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-62494-5\_2}, doi = {10.1007/3-540-62494-5\_2}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/CrispoL96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Cusick96, author = {Thomas W. Cusick}, editor = {T. Mark A. Lomas}, title = {A Comparison of {RSA} and the Naccache-Stern Public-Key Cryptosystem}, booktitle = {Security Protocols, International Workshop, Cambridge, United Kingdom, April 10-12, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1189}, pages = {111--116}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-62494-5\_10}, doi = {10.1007/3-540-62494-5\_10}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Cusick96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/FujisakiO96, author = {Eiichiro Fujisaki and Tatsuaki Okamoto}, editor = {T. Mark A. Lomas}, title = {Practical Escrow Cash System}, booktitle = {Security Protocols, International Workshop, Cambridge, United Kingdom, April 10-12, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1189}, pages = {33--48}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-62494-5\_3}, doi = {10.1007/3-540-62494-5\_3}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/FujisakiO96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/JoyeQ96, author = {Marc Joye and Jean{-}Jacques Quisquater}, editor = {T. Mark A. Lomas}, title = {Protocol Failures for RSA-Like Functions Using Lucas Sequences and Elliptic Curves}, booktitle = {Security Protocols, International Workshop, Cambridge, United Kingdom, April 10-12, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1189}, pages = {93--100}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-62494-5\_8}, doi = {10.1007/3-540-62494-5\_8}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/JoyeQ96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Kaliski96, author = {Burton S. Kaliski Jr.}, editor = {T. Mark A. Lomas}, title = {{IEEE} {P1363:} {A} Standard for RSA, Diffie-Hellman, and Elliptic-Curve Cryptography (Abstract)}, booktitle = {Security Protocols, International Workshop, Cambridge, United Kingdom, April 10-12, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1189}, pages = {117--118}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-62494-5\_11}, doi = {10.1007/3-540-62494-5\_11}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Kaliski96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/LimL96, author = {Chae Hoon Lim and Pil Joong Lee}, editor = {T. Mark A. Lomas}, title = {Directed Signatures and Application to Threshold Cryptosystems}, booktitle = {Security Protocols, International Workshop, Cambridge, United Kingdom, April 10-12, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1189}, pages = {131--138}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-62494-5\_13}, doi = {10.1007/3-540-62494-5\_13}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/LimL96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Mao96, author = {Wenbo Mao}, editor = {T. Mark A. Lomas}, title = {On Cryptographic Techniques for On-line Bankcard Payment Transactions Using Open Networks}, booktitle = {Security Protocols, International Workshop, Cambridge, United Kingdom, April 10-12, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1189}, pages = {1--17}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-62494-5\_1}, doi = {10.1007/3-540-62494-5\_1}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Mao96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/NaorS96, author = {Moni Naor and Adi Shamir}, editor = {T. Mark A. Lomas}, title = {Visual Cryptography {II:} Improving the Contrast Via the Cover Base}, booktitle = {Security Protocols, International Workshop, Cambridge, United Kingdom, April 10-12, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1189}, pages = {197--202}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-62494-5\_18}, doi = {10.1007/3-540-62494-5\_18}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/NaorS96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Pedersen96, author = {Torben P. Pedersen}, editor = {T. Mark A. Lomas}, title = {Electronic Payments of Small Amounts}, booktitle = {Security Protocols, International Workshop, Cambridge, United Kingdom, April 10-12, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1189}, pages = {59--68}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-62494-5\_5}, doi = {10.1007/3-540-62494-5\_5}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Pedersen96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/RivestS96, author = {Ronald L. Rivest and Adi Shamir}, editor = {T. Mark A. Lomas}, title = {PayWord and MicroMint: Two Simple Micropayment Schemes}, booktitle = {Security Protocols, International Workshop, Cambridge, United Kingdom, April 10-12, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1189}, pages = {69--87}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-62494-5\_6}, doi = {10.1007/3-540-62494-5\_6}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/RivestS96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/SchneierK96, author = {Bruce Schneier and John Kelsey}, editor = {T. Mark A. Lomas}, title = {Automatic Event-Stream Notarization Using Digital Signatures}, booktitle = {Security Protocols, International Workshop, Cambridge, United Kingdom, April 10-12, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1189}, pages = {155--169}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-62494-5\_15}, doi = {10.1007/3-540-62494-5\_15}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/SchneierK96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Wheeler96, author = {David Wheeler}, editor = {T. Mark A. Lomas}, title = {Transactions Using Bets}, booktitle = {Security Protocols, International Workshop, Cambridge, United Kingdom, April 10-12, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1189}, pages = {89--92}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-62494-5\_7}, doi = {10.1007/3-540-62494-5\_7}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Wheeler96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.