default search action
8th CCS 2001: Philadelphia, Pennsylvania, USA
- Michael K. Reiter, Pierangela Samarati:
CCS 2001, Proceedings of the 8th ACM Conference on Computer and Communications Security, Philadelphia, Pennsylvania, USA, November 6-8, 2001. ACM 2001, ISBN 1-58113-385-5
Password Management and Digital Signatures
- Niklas Frykholm, Ari Juels:
Error-tolerant password recovery. 1-9 - Philip D. MacKenzie, Michael K. Reiter:
Delegation of cryptographic servers for capture-resilient devices. 10-19 - David Naccache, David Pointcheval, Jacques Stern:
Twin signatures: an alternative to the hash-and-sign paradigm. 20-27 - Adrian Perrig:
The BiBa one-time signature and broadcast authentication protocol. 28-37
Access Control
- Duminda Wijesekera, Sushil Jajodia:
Policy algebras for access control: the propositional case. 38-47 - Vijayalakshmi Atluri, Soon Ae Chun, Pietro Mazzoleni:
A Chinese wall security model for decentralized workflow systems. 48-57 - Gustaf Neumann, Mark Strembeck:
Design and implementation of a flexible RBAC-service in an object-oriented scripting language. 58-67
Mobile Code and Distributed Systems
- Naoya Nitta, Yoshiaki Takata, Hiroyuki Seki:
An efficient security verification method for programs with stack inspection. 68-77 - Alan Harbitter, Daniel A. Menascé:
The performance of public key-enabled kerberos authentication in mobile computing applications. 78-85 - Giuseppe Ateniese, Stefan Mangard:
A new approach to DNS security (DNSSEC). 86-95
Protocols
- Federico Crazzolara, Glynn Winskel:
Events in security protocols. 96-105 - Joseph Y. Halpern, Riccardo Pucella:
On the relationship between strand spaces and multi-agent systems. 106-115 - C. Andrew Neff:
A verifiable secret shuffle and its application to e-voting. 116-125
Secure Data Publishing and Certificate Management
- Marc Waldman, David Mazières:
Tangler: a censorship-resistant publishing system based on document entanglements. 126-135 - Premkumar T. Devanbu, Michael Gertz, April Kwong, Charles U. Martel, Glen Nuckolls, Stuart G. Stubblebine:
Flexible authentication of XML documents. 136-145 - Ting Yu, Marianne Winslett, Kent E. Seamons:
Interoperable strategies in automated trust negotiation. 146-155 - Ninghui Li, William H. Winsborough, John C. Mitchell:
Distributed credential chain discovery in trust management: extended abstract. 156-165
Protocol Analysis
- Jonathan K. Millen, Vitaly Shmatikov:
Constraint solving for bounded-process cryptographic protocol analysis. 166-175 - Rohit Chadha, Max I. Kanovich, Andre Scedrov:
Inductive methods and contract-signing protocols. 176-185 - Joshua D. Guttman, F. Javier Thayer, Lenore D. Zuck:
The faithfulness of abstract protocol analysis: message authentication. 186-195
Cryptosystems
- Phillip Rogaway, Mihir Bellare, John Black, Ted Krovetz:
OCB: a block-cipher mode of operation for efficient authenticated encryption. 196-205 - Dario Catalano, Rosario Gennaro, Nick Howgrave-Graham, Phong Q. Nguyen:
Paillier's cryptosystem revisited. 206-214 - Stuart Haber, Benny Pinkas:
Securely combining public-key cryptosystems. 215-224
Group Key Management and Signatures
- Dawn Xiaodong Song:
Practical forward secure group signature schemes. 225-234 - Catherine Meadows, Paul F. Syverson:
Formalizing GDOI group key management requirements in NPATRL. 235-244 - Silvio Micali, Kazuo Ohta, Leonid Reyzin:
Accountable-subgroup multisignatures: extended abstract. 245-254 - Emmanuel Bresson, Olivier Chevassut, David Pointcheval, Jean-Jacques Quisquater:
Provably authenticated group Diffie-Hellman key exchange. 255-264
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.