Search dblp for Publications

export results for "toc:db/conf/ccs/ccs2001.bht:"

 download as .bib file

@inproceedings{DBLP:conf/ccs/AtenieseM01,
  author       = {Giuseppe Ateniese and
                  Stefan Mangard},
  editor       = {Michael K. Reiter and
                  Pierangela Samarati},
  title        = {A new approach to {DNS} security {(DNSSEC)}},
  booktitle    = {{CCS} 2001, Proceedings of the 8th {ACM} Conference on Computer and
                  Communications Security, Philadelphia, Pennsylvania, USA, November
                  6-8, 2001},
  pages        = {86--95},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/501983.501996},
  doi          = {10.1145/501983.501996},
  timestamp    = {Tue, 10 Nov 2020 20:00:35 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/AtenieseM01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AtluriCM01,
  author       = {Vijayalakshmi Atluri and
                  Soon Ae Chun and
                  Pietro Mazzoleni},
  editor       = {Michael K. Reiter and
                  Pierangela Samarati},
  title        = {A Chinese wall security model for decentralized workflow systems},
  booktitle    = {{CCS} 2001, Proceedings of the 8th {ACM} Conference on Computer and
                  Communications Security, Philadelphia, Pennsylvania, USA, November
                  6-8, 2001},
  pages        = {48--57},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/501983.501991},
  doi          = {10.1145/501983.501991},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/AtluriCM01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BressonCPQ01,
  author       = {Emmanuel Bresson and
                  Olivier Chevassut and
                  David Pointcheval and
                  Jean{-}Jacques Quisquater},
  editor       = {Michael K. Reiter and
                  Pierangela Samarati},
  title        = {Provably authenticated group Diffie-Hellman key exchange},
  booktitle    = {{CCS} 2001, Proceedings of the 8th {ACM} Conference on Computer and
                  Communications Security, Philadelphia, Pennsylvania, USA, November
                  6-8, 2001},
  pages        = {255--264},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/501983.502018},
  doi          = {10.1145/501983.502018},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BressonCPQ01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CatalanoGHN01,
  author       = {Dario Catalano and
                  Rosario Gennaro and
                  Nick Howgrave{-}Graham and
                  Phong Q. Nguyen},
  editor       = {Michael K. Reiter and
                  Pierangela Samarati},
  title        = {Paillier's cryptosystem revisited},
  booktitle    = {{CCS} 2001, Proceedings of the 8th {ACM} Conference on Computer and
                  Communications Security, Philadelphia, Pennsylvania, USA, November
                  6-8, 2001},
  pages        = {206--214},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/501983.502012},
  doi          = {10.1145/501983.502012},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/CatalanoGHN01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ChadhaKS01,
  author       = {Rohit Chadha and
                  Max I. Kanovich and
                  Andre Scedrov},
  editor       = {Michael K. Reiter and
                  Pierangela Samarati},
  title        = {Inductive methods and contract-signing protocols},
  booktitle    = {{CCS} 2001, Proceedings of the 8th {ACM} Conference on Computer and
                  Communications Security, Philadelphia, Pennsylvania, USA, November
                  6-8, 2001},
  pages        = {176--185},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/501983.502008},
  doi          = {10.1145/501983.502008},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ChadhaKS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CrazzolaraW01,
  author       = {Federico Crazzolara and
                  Glynn Winskel},
  editor       = {Michael K. Reiter and
                  Pierangela Samarati},
  title        = {Events in security protocols},
  booktitle    = {{CCS} 2001, Proceedings of the 8th {ACM} Conference on Computer and
                  Communications Security, Philadelphia, Pennsylvania, USA, November
                  6-8, 2001},
  pages        = {96--105},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/501983.501998},
  doi          = {10.1145/501983.501998},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/CrazzolaraW01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DevanbuGKMNS01,
  author       = {Premkumar T. Devanbu and
                  Michael Gertz and
                  April Kwong and
                  Charles U. Martel and
                  Glen Nuckolls and
                  Stuart G. Stubblebine},
  editor       = {Michael K. Reiter and
                  Pierangela Samarati},
  title        = {Flexible authentication of {XML} documents},
  booktitle    = {{CCS} 2001, Proceedings of the 8th {ACM} Conference on Computer and
                  Communications Security, Philadelphia, Pennsylvania, USA, November
                  6-8, 2001},
  pages        = {136--145},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/501983.502003},
  doi          = {10.1145/501983.502003},
  timestamp    = {Mon, 07 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/DevanbuGKMNS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/FrykholmJ01,
  author       = {Niklas Frykholm and
                  Ari Juels},
  editor       = {Michael K. Reiter and
                  Pierangela Samarati},
  title        = {Error-tolerant password recovery},
  booktitle    = {{CCS} 2001, Proceedings of the 8th {ACM} Conference on Computer and
                  Communications Security, Philadelphia, Pennsylvania, USA, November
                  6-8, 2001},
  pages        = {1--9},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/501983.501985},
  doi          = {10.1145/501983.501985},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/FrykholmJ01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GuttmanTZ01,
  author       = {Joshua D. Guttman and
                  F. Javier Thayer and
                  Lenore D. Zuck},
  editor       = {Michael K. Reiter and
                  Pierangela Samarati},
  title        = {The faithfulness of abstract protocol analysis: message authentication},
  booktitle    = {{CCS} 2001, Proceedings of the 8th {ACM} Conference on Computer and
                  Communications Security, Philadelphia, Pennsylvania, USA, November
                  6-8, 2001},
  pages        = {186--195},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/501983.502009},
  doi          = {10.1145/501983.502009},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/GuttmanTZ01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HaberP01,
  author       = {Stuart Haber and
                  Benny Pinkas},
  editor       = {Michael K. Reiter and
                  Pierangela Samarati},
  title        = {Securely combining public-key cryptosystems},
  booktitle    = {{CCS} 2001, Proceedings of the 8th {ACM} Conference on Computer and
                  Communications Security, Philadelphia, Pennsylvania, USA, November
                  6-8, 2001},
  pages        = {215--224},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/501983.502013},
  doi          = {10.1145/501983.502013},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/HaberP01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HalpernP01,
  author       = {Joseph Y. Halpern and
                  Riccardo Pucella},
  editor       = {Michael K. Reiter and
                  Pierangela Samarati},
  title        = {On the relationship between strand spaces and multi-agent systems},
  booktitle    = {{CCS} 2001, Proceedings of the 8th {ACM} Conference on Computer and
                  Communications Security, Philadelphia, Pennsylvania, USA, November
                  6-8, 2001},
  pages        = {106--115},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/501983.501999},
  doi          = {10.1145/501983.501999},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/HalpernP01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HarbitterM01,
  author       = {Alan Harbitter and
                  Daniel A. Menasc{\'{e}}},
  editor       = {Michael K. Reiter and
                  Pierangela Samarati},
  title        = {The performance of public key-enabled kerberos authentication in mobile
                  computing applications},
  booktitle    = {{CCS} 2001, Proceedings of the 8th {ACM} Conference on Computer and
                  Communications Security, Philadelphia, Pennsylvania, USA, November
                  6-8, 2001},
  pages        = {78--85},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/501983.501995},
  doi          = {10.1145/501983.501995},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/HarbitterM01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LiWM01,
  author       = {Ninghui Li and
                  William H. Winsborough and
                  John C. Mitchell},
  editor       = {Michael K. Reiter and
                  Pierangela Samarati},
  title        = {Distributed credential chain discovery in trust management: extended
                  abstract},
  booktitle    = {{CCS} 2001, Proceedings of the 8th {ACM} Conference on Computer and
                  Communications Security, Philadelphia, Pennsylvania, USA, November
                  6-8, 2001},
  pages        = {156--165},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/501983.502005},
  doi          = {10.1145/501983.502005},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LiWM01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MacKenzieR01,
  author       = {Philip D. MacKenzie and
                  Michael K. Reiter},
  editor       = {Michael K. Reiter and
                  Pierangela Samarati},
  title        = {Delegation of cryptographic servers for capture-resilient devices},
  booktitle    = {{CCS} 2001, Proceedings of the 8th {ACM} Conference on Computer and
                  Communications Security, Philadelphia, Pennsylvania, USA, November
                  6-8, 2001},
  pages        = {10--19},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/501983.501986},
  doi          = {10.1145/501983.501986},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/MacKenzieR01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MeadowsS01,
  author       = {Catherine Meadows and
                  Paul F. Syverson},
  editor       = {Michael K. Reiter and
                  Pierangela Samarati},
  title        = {Formalizing {GDOI} group key management requirements in {NPATRL}},
  booktitle    = {{CCS} 2001, Proceedings of the 8th {ACM} Conference on Computer and
                  Communications Security, Philadelphia, Pennsylvania, USA, November
                  6-8, 2001},
  pages        = {235--244},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/501983.502016},
  doi          = {10.1145/501983.502016},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/MeadowsS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MicaliOR01,
  author       = {Silvio Micali and
                  Kazuo Ohta and
                  Leonid Reyzin},
  editor       = {Michael K. Reiter and
                  Pierangela Samarati},
  title        = {Accountable-subgroup multisignatures: extended abstract},
  booktitle    = {{CCS} 2001, Proceedings of the 8th {ACM} Conference on Computer and
                  Communications Security, Philadelphia, Pennsylvania, USA, November
                  6-8, 2001},
  pages        = {245--254},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/501983.502017},
  doi          = {10.1145/501983.502017},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/MicaliOR01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MillenS01,
  author       = {Jonathan K. Millen and
                  Vitaly Shmatikov},
  editor       = {Michael K. Reiter and
                  Pierangela Samarati},
  title        = {Constraint solving for bounded-process cryptographic protocol analysis},
  booktitle    = {{CCS} 2001, Proceedings of the 8th {ACM} Conference on Computer and
                  Communications Security, Philadelphia, Pennsylvania, USA, November
                  6-8, 2001},
  pages        = {166--175},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/501983.502007},
  doi          = {10.1145/501983.502007},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/MillenS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/NaccachePS01,
  author       = {David Naccache and
                  David Pointcheval and
                  Jacques Stern},
  editor       = {Michael K. Reiter and
                  Pierangela Samarati},
  title        = {Twin signatures: an alternative to the hash-and-sign paradigm},
  booktitle    = {{CCS} 2001, Proceedings of the 8th {ACM} Conference on Computer and
                  Communications Security, Philadelphia, Pennsylvania, USA, November
                  6-8, 2001},
  pages        = {20--27},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/501983.501987},
  doi          = {10.1145/501983.501987},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/NaccachePS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Neff01,
  author       = {C. Andrew Neff},
  editor       = {Michael K. Reiter and
                  Pierangela Samarati},
  title        = {A verifiable secret shuffle and its application to e-voting},
  booktitle    = {{CCS} 2001, Proceedings of the 8th {ACM} Conference on Computer and
                  Communications Security, Philadelphia, Pennsylvania, USA, November
                  6-8, 2001},
  pages        = {116--125},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/501983.502000},
  doi          = {10.1145/501983.502000},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Neff01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/NeumannS01,
  author       = {Gustaf Neumann and
                  Mark Strembeck},
  editor       = {Michael K. Reiter and
                  Pierangela Samarati},
  title        = {Design and implementation of a flexible RBAC-service in an object-oriented
                  scripting language},
  booktitle    = {{CCS} 2001, Proceedings of the 8th {ACM} Conference on Computer and
                  Communications Security, Philadelphia, Pennsylvania, USA, November
                  6-8, 2001},
  pages        = {58--67},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/501983.501992},
  doi          = {10.1145/501983.501992},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/NeumannS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/NittaTS01,
  author       = {Naoya Nitta and
                  Yoshiaki Takata and
                  Hiroyuki Seki},
  editor       = {Michael K. Reiter and
                  Pierangela Samarati},
  title        = {An efficient security verification method for programs with stack
                  inspection},
  booktitle    = {{CCS} 2001, Proceedings of the 8th {ACM} Conference on Computer and
                  Communications Security, Philadelphia, Pennsylvania, USA, November
                  6-8, 2001},
  pages        = {68--77},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/501983.501994},
  doi          = {10.1145/501983.501994},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/NittaTS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Perrig01,
  author       = {Adrian Perrig},
  editor       = {Michael K. Reiter and
                  Pierangela Samarati},
  title        = {The BiBa one-time signature and broadcast authentication protocol},
  booktitle    = {{CCS} 2001, Proceedings of the 8th {ACM} Conference on Computer and
                  Communications Security, Philadelphia, Pennsylvania, USA, November
                  6-8, 2001},
  pages        = {28--37},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/501983.501988},
  doi          = {10.1145/501983.501988},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Perrig01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/RogawayBBK01,
  author       = {Phillip Rogaway and
                  Mihir Bellare and
                  John Black and
                  Ted Krovetz},
  editor       = {Michael K. Reiter and
                  Pierangela Samarati},
  title        = {{OCB:} a block-cipher mode of operation for efficient authenticated
                  encryption},
  booktitle    = {{CCS} 2001, Proceedings of the 8th {ACM} Conference on Computer and
                  Communications Security, Philadelphia, Pennsylvania, USA, November
                  6-8, 2001},
  pages        = {196--205},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/501983.502011},
  doi          = {10.1145/501983.502011},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/RogawayBBK01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Song01,
  author       = {Dawn Xiaodong Song},
  editor       = {Michael K. Reiter and
                  Pierangela Samarati},
  title        = {Practical forward secure group signature schemes},
  booktitle    = {{CCS} 2001, Proceedings of the 8th {ACM} Conference on Computer and
                  Communications Security, Philadelphia, Pennsylvania, USA, November
                  6-8, 2001},
  pages        = {225--234},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/501983.502015},
  doi          = {10.1145/501983.502015},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Song01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WaldmanM01,
  author       = {Marc Waldman and
                  David Mazi{\`{e}}res},
  editor       = {Michael K. Reiter and
                  Pierangela Samarati},
  title        = {Tangler: a censorship-resistant publishing system based on document
                  entanglements},
  booktitle    = {{CCS} 2001, Proceedings of the 8th {ACM} Conference on Computer and
                  Communications Security, Philadelphia, Pennsylvania, USA, November
                  6-8, 2001},
  pages        = {126--135},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/501983.502002},
  doi          = {10.1145/501983.502002},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/WaldmanM01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WijesekeraJ01,
  author       = {Duminda Wijesekera and
                  Sushil Jajodia},
  editor       = {Michael K. Reiter and
                  Pierangela Samarati},
  title        = {Policy algebras for access control: the propositional case},
  booktitle    = {{CCS} 2001, Proceedings of the 8th {ACM} Conference on Computer and
                  Communications Security, Philadelphia, Pennsylvania, USA, November
                  6-8, 2001},
  pages        = {38--47},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/501983.501990},
  doi          = {10.1145/501983.501990},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/WijesekeraJ01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/YuWS01,
  author       = {Ting Yu and
                  Marianne Winslett and
                  Kent E. Seamons},
  editor       = {Michael K. Reiter and
                  Pierangela Samarati},
  title        = {Interoperable strategies in automated trust negotiation},
  booktitle    = {{CCS} 2001, Proceedings of the 8th {ACM} Conference on Computer and
                  Communications Security, Philadelphia, Pennsylvania, USA, November
                  6-8, 2001},
  pages        = {146--155},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/501983.502004},
  doi          = {10.1145/501983.502004},
  timestamp    = {Mon, 04 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/YuWS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2001,
  editor       = {Michael K. Reiter and
                  Pierangela Samarati},
  title        = {{CCS} 2001, Proceedings of the 8th {ACM} Conference on Computer and
                  Communications Security, Philadelphia, Pennsylvania, USA, November
                  6-8, 2001},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {http://dl.acm.org/citation.cfm?id=501983},
  isbn         = {1-58113-385-5},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2001.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics