Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/ccs/ccs2001.bht:"
@inproceedings{DBLP:conf/ccs/AtenieseM01, author = {Giuseppe Ateniese and Stefan Mangard}, editor = {Michael K. Reiter and Pierangela Samarati}, title = {A new approach to {DNS} security {(DNSSEC)}}, booktitle = {{CCS} 2001, Proceedings of the 8th {ACM} Conference on Computer and Communications Security, Philadelphia, Pennsylvania, USA, November 6-8, 2001}, pages = {86--95}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/501983.501996}, doi = {10.1145/501983.501996}, timestamp = {Tue, 10 Nov 2020 20:00:35 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AtenieseM01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AtluriCM01, author = {Vijayalakshmi Atluri and Soon Ae Chun and Pietro Mazzoleni}, editor = {Michael K. Reiter and Pierangela Samarati}, title = {A Chinese wall security model for decentralized workflow systems}, booktitle = {{CCS} 2001, Proceedings of the 8th {ACM} Conference on Computer and Communications Security, Philadelphia, Pennsylvania, USA, November 6-8, 2001}, pages = {48--57}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/501983.501991}, doi = {10.1145/501983.501991}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/AtluriCM01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BressonCPQ01, author = {Emmanuel Bresson and Olivier Chevassut and David Pointcheval and Jean{-}Jacques Quisquater}, editor = {Michael K. Reiter and Pierangela Samarati}, title = {Provably authenticated group Diffie-Hellman key exchange}, booktitle = {{CCS} 2001, Proceedings of the 8th {ACM} Conference on Computer and Communications Security, Philadelphia, Pennsylvania, USA, November 6-8, 2001}, pages = {255--264}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/501983.502018}, doi = {10.1145/501983.502018}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BressonCPQ01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CatalanoGHN01, author = {Dario Catalano and Rosario Gennaro and Nick Howgrave{-}Graham and Phong Q. Nguyen}, editor = {Michael K. Reiter and Pierangela Samarati}, title = {Paillier's cryptosystem revisited}, booktitle = {{CCS} 2001, Proceedings of the 8th {ACM} Conference on Computer and Communications Security, Philadelphia, Pennsylvania, USA, November 6-8, 2001}, pages = {206--214}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/501983.502012}, doi = {10.1145/501983.502012}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/CatalanoGHN01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChadhaKS01, author = {Rohit Chadha and Max I. Kanovich and Andre Scedrov}, editor = {Michael K. Reiter and Pierangela Samarati}, title = {Inductive methods and contract-signing protocols}, booktitle = {{CCS} 2001, Proceedings of the 8th {ACM} Conference on Computer and Communications Security, Philadelphia, Pennsylvania, USA, November 6-8, 2001}, pages = {176--185}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/501983.502008}, doi = {10.1145/501983.502008}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ChadhaKS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CrazzolaraW01, author = {Federico Crazzolara and Glynn Winskel}, editor = {Michael K. Reiter and Pierangela Samarati}, title = {Events in security protocols}, booktitle = {{CCS} 2001, Proceedings of the 8th {ACM} Conference on Computer and Communications Security, Philadelphia, Pennsylvania, USA, November 6-8, 2001}, pages = {96--105}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/501983.501998}, doi = {10.1145/501983.501998}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/CrazzolaraW01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DevanbuGKMNS01, author = {Premkumar T. Devanbu and Michael Gertz and April Kwong and Charles U. Martel and Glen Nuckolls and Stuart G. Stubblebine}, editor = {Michael K. Reiter and Pierangela Samarati}, title = {Flexible authentication of {XML} documents}, booktitle = {{CCS} 2001, Proceedings of the 8th {ACM} Conference on Computer and Communications Security, Philadelphia, Pennsylvania, USA, November 6-8, 2001}, pages = {136--145}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/501983.502003}, doi = {10.1145/501983.502003}, timestamp = {Mon, 07 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DevanbuGKMNS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/FrykholmJ01, author = {Niklas Frykholm and Ari Juels}, editor = {Michael K. Reiter and Pierangela Samarati}, title = {Error-tolerant password recovery}, booktitle = {{CCS} 2001, Proceedings of the 8th {ACM} Conference on Computer and Communications Security, Philadelphia, Pennsylvania, USA, November 6-8, 2001}, pages = {1--9}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/501983.501985}, doi = {10.1145/501983.501985}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/FrykholmJ01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GuttmanTZ01, author = {Joshua D. Guttman and F. Javier Thayer and Lenore D. Zuck}, editor = {Michael K. Reiter and Pierangela Samarati}, title = {The faithfulness of abstract protocol analysis: message authentication}, booktitle = {{CCS} 2001, Proceedings of the 8th {ACM} Conference on Computer and Communications Security, Philadelphia, Pennsylvania, USA, November 6-8, 2001}, pages = {186--195}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/501983.502009}, doi = {10.1145/501983.502009}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GuttmanTZ01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HaberP01, author = {Stuart Haber and Benny Pinkas}, editor = {Michael K. Reiter and Pierangela Samarati}, title = {Securely combining public-key cryptosystems}, booktitle = {{CCS} 2001, Proceedings of the 8th {ACM} Conference on Computer and Communications Security, Philadelphia, Pennsylvania, USA, November 6-8, 2001}, pages = {215--224}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/501983.502013}, doi = {10.1145/501983.502013}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HaberP01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HalpernP01, author = {Joseph Y. Halpern and Riccardo Pucella}, editor = {Michael K. Reiter and Pierangela Samarati}, title = {On the relationship between strand spaces and multi-agent systems}, booktitle = {{CCS} 2001, Proceedings of the 8th {ACM} Conference on Computer and Communications Security, Philadelphia, Pennsylvania, USA, November 6-8, 2001}, pages = {106--115}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/501983.501999}, doi = {10.1145/501983.501999}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HalpernP01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HarbitterM01, author = {Alan Harbitter and Daniel A. Menasc{\'{e}}}, editor = {Michael K. Reiter and Pierangela Samarati}, title = {The performance of public key-enabled kerberos authentication in mobile computing applications}, booktitle = {{CCS} 2001, Proceedings of the 8th {ACM} Conference on Computer and Communications Security, Philadelphia, Pennsylvania, USA, November 6-8, 2001}, pages = {78--85}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/501983.501995}, doi = {10.1145/501983.501995}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HarbitterM01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiWM01, author = {Ninghui Li and William H. Winsborough and John C. Mitchell}, editor = {Michael K. Reiter and Pierangela Samarati}, title = {Distributed credential chain discovery in trust management: extended abstract}, booktitle = {{CCS} 2001, Proceedings of the 8th {ACM} Conference on Computer and Communications Security, Philadelphia, Pennsylvania, USA, November 6-8, 2001}, pages = {156--165}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/501983.502005}, doi = {10.1145/501983.502005}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LiWM01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MacKenzieR01, author = {Philip D. MacKenzie and Michael K. Reiter}, editor = {Michael K. Reiter and Pierangela Samarati}, title = {Delegation of cryptographic servers for capture-resilient devices}, booktitle = {{CCS} 2001, Proceedings of the 8th {ACM} Conference on Computer and Communications Security, Philadelphia, Pennsylvania, USA, November 6-8, 2001}, pages = {10--19}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/501983.501986}, doi = {10.1145/501983.501986}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MacKenzieR01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MeadowsS01, author = {Catherine Meadows and Paul F. Syverson}, editor = {Michael K. Reiter and Pierangela Samarati}, title = {Formalizing {GDOI} group key management requirements in {NPATRL}}, booktitle = {{CCS} 2001, Proceedings of the 8th {ACM} Conference on Computer and Communications Security, Philadelphia, Pennsylvania, USA, November 6-8, 2001}, pages = {235--244}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/501983.502016}, doi = {10.1145/501983.502016}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/MeadowsS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MicaliOR01, author = {Silvio Micali and Kazuo Ohta and Leonid Reyzin}, editor = {Michael K. Reiter and Pierangela Samarati}, title = {Accountable-subgroup multisignatures: extended abstract}, booktitle = {{CCS} 2001, Proceedings of the 8th {ACM} Conference on Computer and Communications Security, Philadelphia, Pennsylvania, USA, November 6-8, 2001}, pages = {245--254}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/501983.502017}, doi = {10.1145/501983.502017}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MicaliOR01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MillenS01, author = {Jonathan K. Millen and Vitaly Shmatikov}, editor = {Michael K. Reiter and Pierangela Samarati}, title = {Constraint solving for bounded-process cryptographic protocol analysis}, booktitle = {{CCS} 2001, Proceedings of the 8th {ACM} Conference on Computer and Communications Security, Philadelphia, Pennsylvania, USA, November 6-8, 2001}, pages = {166--175}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/501983.502007}, doi = {10.1145/501983.502007}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MillenS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/NaccachePS01, author = {David Naccache and David Pointcheval and Jacques Stern}, editor = {Michael K. Reiter and Pierangela Samarati}, title = {Twin signatures: an alternative to the hash-and-sign paradigm}, booktitle = {{CCS} 2001, Proceedings of the 8th {ACM} Conference on Computer and Communications Security, Philadelphia, Pennsylvania, USA, November 6-8, 2001}, pages = {20--27}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/501983.501987}, doi = {10.1145/501983.501987}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/NaccachePS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Neff01, author = {C. Andrew Neff}, editor = {Michael K. Reiter and Pierangela Samarati}, title = {A verifiable secret shuffle and its application to e-voting}, booktitle = {{CCS} 2001, Proceedings of the 8th {ACM} Conference on Computer and Communications Security, Philadelphia, Pennsylvania, USA, November 6-8, 2001}, pages = {116--125}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/501983.502000}, doi = {10.1145/501983.502000}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Neff01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/NeumannS01, author = {Gustaf Neumann and Mark Strembeck}, editor = {Michael K. Reiter and Pierangela Samarati}, title = {Design and implementation of a flexible RBAC-service in an object-oriented scripting language}, booktitle = {{CCS} 2001, Proceedings of the 8th {ACM} Conference on Computer and Communications Security, Philadelphia, Pennsylvania, USA, November 6-8, 2001}, pages = {58--67}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/501983.501992}, doi = {10.1145/501983.501992}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/NeumannS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/NittaTS01, author = {Naoya Nitta and Yoshiaki Takata and Hiroyuki Seki}, editor = {Michael K. Reiter and Pierangela Samarati}, title = {An efficient security verification method for programs with stack inspection}, booktitle = {{CCS} 2001, Proceedings of the 8th {ACM} Conference on Computer and Communications Security, Philadelphia, Pennsylvania, USA, November 6-8, 2001}, pages = {68--77}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/501983.501994}, doi = {10.1145/501983.501994}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/NittaTS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Perrig01, author = {Adrian Perrig}, editor = {Michael K. Reiter and Pierangela Samarati}, title = {The BiBa one-time signature and broadcast authentication protocol}, booktitle = {{CCS} 2001, Proceedings of the 8th {ACM} Conference on Computer and Communications Security, Philadelphia, Pennsylvania, USA, November 6-8, 2001}, pages = {28--37}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/501983.501988}, doi = {10.1145/501983.501988}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Perrig01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/RogawayBBK01, author = {Phillip Rogaway and Mihir Bellare and John Black and Ted Krovetz}, editor = {Michael K. Reiter and Pierangela Samarati}, title = {{OCB:} a block-cipher mode of operation for efficient authenticated encryption}, booktitle = {{CCS} 2001, Proceedings of the 8th {ACM} Conference on Computer and Communications Security, Philadelphia, Pennsylvania, USA, November 6-8, 2001}, pages = {196--205}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/501983.502011}, doi = {10.1145/501983.502011}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/RogawayBBK01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Song01, author = {Dawn Xiaodong Song}, editor = {Michael K. Reiter and Pierangela Samarati}, title = {Practical forward secure group signature schemes}, booktitle = {{CCS} 2001, Proceedings of the 8th {ACM} Conference on Computer and Communications Security, Philadelphia, Pennsylvania, USA, November 6-8, 2001}, pages = {225--234}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/501983.502015}, doi = {10.1145/501983.502015}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Song01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WaldmanM01, author = {Marc Waldman and David Mazi{\`{e}}res}, editor = {Michael K. Reiter and Pierangela Samarati}, title = {Tangler: a censorship-resistant publishing system based on document entanglements}, booktitle = {{CCS} 2001, Proceedings of the 8th {ACM} Conference on Computer and Communications Security, Philadelphia, Pennsylvania, USA, November 6-8, 2001}, pages = {126--135}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/501983.502002}, doi = {10.1145/501983.502002}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/WaldmanM01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WijesekeraJ01, author = {Duminda Wijesekera and Sushil Jajodia}, editor = {Michael K. Reiter and Pierangela Samarati}, title = {Policy algebras for access control: the propositional case}, booktitle = {{CCS} 2001, Proceedings of the 8th {ACM} Conference on Computer and Communications Security, Philadelphia, Pennsylvania, USA, November 6-8, 2001}, pages = {38--47}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/501983.501990}, doi = {10.1145/501983.501990}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/WijesekeraJ01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/YuWS01, author = {Ting Yu and Marianne Winslett and Kent E. Seamons}, editor = {Michael K. Reiter and Pierangela Samarati}, title = {Interoperable strategies in automated trust negotiation}, booktitle = {{CCS} 2001, Proceedings of the 8th {ACM} Conference on Computer and Communications Security, Philadelphia, Pennsylvania, USA, November 6-8, 2001}, pages = {146--155}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/501983.502004}, doi = {10.1145/501983.502004}, timestamp = {Mon, 04 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/YuWS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2001, editor = {Michael K. Reiter and Pierangela Samarati}, title = {{CCS} 2001, Proceedings of the 8th {ACM} Conference on Computer and Communications Security, Philadelphia, Pennsylvania, USA, November 6-8, 2001}, publisher = {{ACM}}, year = {2001}, url = {http://dl.acm.org/citation.cfm?id=501983}, isbn = {1-58113-385-5}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2001.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.