Session details: Applied cryptography 1
Abstract
No abstract available.
Recommendations
Session details: Session 1D: Applied Cryptography and Cryptanalysis
CCS '20: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications SecuritySession details: Session 2B: Applied Cryptography
CCS '20: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications SecuritySession details: Applied cryptography II
CCS '10: Proceedings of the 17th ACM conference on Computer and communications security
Comments
Information & Contributors
Information
Published In
October 2008
590 pages
ISBN:9781595938107
DOI:10.1145/1455770
- General Chair:
- Peng Ning,
- Program Chairs:
- Paul Syverson,
- Somesh Jha
Copyright © 2008 ACM.
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Published: 27 October 2008
Check for updates
Qualifiers
- Section
Conference
CCS08: 15th ACM Conference on Computer and Communications Security 2008
October 27 - 31, 2008
Virginia, Alexandria, USA
Acceptance Rates
CCS '08 Paper Acceptance Rate 51 of 280 submissions, 18%;
Overall Acceptance Rate 1,261 of 6,999 submissions, 18%
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 0Total Downloads
- Downloads (Last 12 months)0
- Downloads (Last 6 weeks)0
Reflects downloads up to 10 Oct 2024
Other Metrics
Citations
View Options
Get Access
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in