


default search action
7th CCS 2000: Athens, Greece
- Dimitris Gritzalis, Sushil Jajodia, Pierangela Samarati:

CCS 2000, Proceedings of the 7th ACM Conference on Computer and Communications Security, Athens, Greece, November 1-4, 2000. ACM 2000, ISBN 1-58113-203-4
Certificate Management
- John Iliadis, Diomidis Spinellis, Dimitris Gritzalis, Bart Preneel, Sokratis K. Katsikas:

Evaluating certificate status information mechanisms. 1-8 - Ahto Buldas, Peeter Laud

, Helger Lipmaa:
Accountable certificate management using undeniable attestations. 9-17 - Rebecca N. Wright, Patrick Lincoln, Jonathan K. Millen:

Efficient fault-tolerant certificate revocation. 19-24
Privacy and Anonymity
- Edward W. Felten, Michael A. Schneider:

Timing attacks on Web privacy. 25-32 - Clay Shields, Brian Neil Levine:

A protocol for anonymous communication over the Internet. 33-42 - Manfred Hauswirth, Clemens Kerer, Roman Kurmanowytsch:

A secure execution framework for Java. 43-52 - Pino Persiano, Ivan Visconti:

User privacy issues regarding certificates and the TLS protocol: the design and implementation of the SPSL protocol. 53-62
Electronic Commerce
- Glenn Durfee, Matthew K. Franklin:

Distribution chain security. 63-70 - Joachim Biskup, Ulrich Flegel:

Threshold-based identity recovery for privacy enhanced applications. 71-79 - Yuji Watanabe, Hideki Imai:

Reducing the round complexity of a sealed-bid auction protocol with an off-line TTP. 80-86 - Michiharu Kudo, Satoshi Hada:

XML document security based on provisional authorization. 87-96
Invited Talk
- Ravi Ganesan:

Security: the state of the practice (invited talk). 97
Panel
- Carlisle M. Adams, Mike Burmester, Yvo Desmedt, Michael K. Reiter, Philip R. Zimmermann:

Which PKI (public key infrastructure) is the right one? (panel session). 98-101
Cryptography and Steganography
- Johannes Merkle:

Multi-round passive attacks on server-aided RSA protocols. 102-107 - Hugo Krawczyk:

Simple forward-secure signatures from any signature scheme. 108-115 - Yvo Desmedt, Tri Van Le:

Moiré cryptography. 116-124 - Johan Håstad, Jakob Jonsson, Ari Juels, Moti Yung:

Funkspiel schemes: an alternative to conventional tamper resistance. 125-133
Access Control
- Piero A. Bonatti, Pierangela Samarati:

Regulating service access and information release on the Web. 134-143 - Avigdor Gal, Vijayalakshmi Atluri

:
An authorization model for temporal data. 144-153 - Jonathon Tidswell, Trent Jaeger:

An access control model for simplifying constraint expression. 154-163 - Piero A. Bonatti, Sabrina De Capitani di Vimercati, Pierangela Samarati:

A modular approach to composing access control policies. 164-173
Systems Security
- Massimo Bernaschi, Emanuele Gabrielli, Luigi V. Mancini:

Operating system enhancements to prevent the misuse of system calls. 174-183 - Thomas W. Doeppner Jr., Philip N. Klein, Andrew Koyfman:

Using router stamping to identify the source of IP packets. 184-189 - Sotiris Ioannidis, Angelos D. Keromytis, Steven M. Bellovin, Jonathan M. Smith:

Implementing a distributed firewall. 190-199 - Vijay Varadharajan:

Security enhanced mobile agents. 200-209
Internet Security and Composition
- Ting Yu, Xiaosong Ma, Marianne Winslett:

PRUNES: an efficient and complete strategy for automated trust negotiation over the Internet. 210-219 - Richard Au, Mark Looi, Paul Ashley

:
Cross-domain one-shot authorization using smart cards. 220-227 - Reihaneh Safavi-Naini, Huaxiong Wang:

New constructions for multicast re-keying schemes using perfect hash families. 228-234 - Yongdae Kim, Adrian Perrig, Gene Tsudik:

Simple and fault-tolerant key agreement for dynamic collaborative groups. 235-244 - Birgit Pfitzmann, Michael Waidner

:
Composition and integrity preservation of secure reactive systems. 245-254
Tutorials
- John Ioannidis, Angelos D. Keromytis:

Network security and IPsec (tutorial). - Yair Frankel:

Electronic payment technologies.

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














