1. CCS 1993:
Fairfax,
Virginia,
USA
 CCS '93,
Proceedings of the 1st ACM Conference on Computer and Communications Security,
November 3-5,
1993,
Fairfax,
Virginia,
USA. ACM,
1993 
- Ralf C. Hauser:
 Does Licensing Require New Access Control Techniques?
1-8
             
- Matt Blaze:
 A Cryptographic File System for UNIX.
9-16
             
- Miguel Soriano, Jordi Forné, Francisco Recacha, José L. Melús:
 A Particular Solution to Provide Secure Communications in an Ethernet Environment.
17-25
             
- Li Gong:
 Lower Bounds on Messages and Rounds for Network Authentication Protocols.
26-37
             
- Raphael Yahalom:
 Optimality of Multi-Domain Protocols.
38-48
             
- Gene Tsudik, Els Van Herreweghen:
 On Simple and Secure Key Distribution.
49-57
             
- Kaisa Nyberg, Rainer A. Rueppel:
 A New Signature Scheme Based on the DSA Giving Message Recovery.
58-61
             
- Mihir Bellare, Phillip Rogaway:
 Random Oracles are Practical: A Paradigm for Designing Efficient Protocols.
62-73
             
- Birgit Pfitzmann:
 Sorting Out Signature Schemes.
74-85
             
- Patrick W. Brown:
 Digital Signatures: Can They be Accepted as Legal Signatures in EDI?
86-92
             
- Donald Byron Johnson, Stephen M. Matyas, An V. Le, John D. Wilkins:
 Design of the Commercial Data Masking Facility Data Privacy Algorithm.
93-96
             
- Paul F. Syverson:
 Adding Time to a Logic of Authentication.
97-101
             
- Gennady Medvinsky, B. Clifford Neuman:
 NetCash: A Design for Practical Electronic Currency on the Internet.
102-106
             
- Dan Brown:
 Security Planning for Personal Communications.
107-111
             
- Thomas Y. C. Woo, Simon S. Lam:
 A Framework for Distributed Authorization.
112-118
             
- Myong H. Kang, Ira S. Moskowitz:
 A Pump for Rapid, Reliable, Secure Communication.
119-129
             
- Elisa Bertino, Pierangela Samarati, Sushil Jajodia:
 Authorizations in Relational Database Management Systems.
130-139
             
- Elisa Bertino, Pierangela Samarati, Sushil Jajodia:
 High Assurance Discretionary Access Control for Object Bases.
140-150
             
- Roger M. Needham:
 Denial of Service.
151-153
             
- Calvin Ko, Deborah A. Frincke, Terrance Goan, Todd L. Heberlein, Karl N. Levitt, Biswanath Mukherjee, Christopher Wee:
 Analysis of an Algorithm for Distributed Recognition and Accountability.
154-164
             
- Ping Lin, C. Sekar Chandersekaran:
 Integration of DCE and Local Registries: Design Approaches.
165-170
             
- Jennifer Seberry, Xian-Mo Zhang, Yuliang Zheng:
 Systematic Generation of Cryptographically Robust S-Boxes.
171-182
             
- Bart Preneel, René Govaerts, Joos Vandewalle:
 Differential Cryptanalysis of Hash Functions Based on Block Ciphers.
183-188
             
- Thomas Beth, Hans-Joachim Knobloch, Marcus Otten:
 Verifiable Secret Sharing for Monotone Access Structures.
189-194
             
- Hank M. Kluepfel:
 Securing a Global Village and Its Resources: Baseline Security for Interconnected Signaling System #7 Telecommunications Networks.
195-212
             
- Gustavus J. Simmons:
 Cryptanalysis and Protocol Failures (abstract).
213-214
             
- Ross J. Anderson:
 Why Cryptosystems Fail.
215-227
             
- Yvo Desmedt, Mike Burmester:
 Towards Practical ``Proven Secure'' Authenticated Key Distribution.
228-231
             
- Paul C. van Oorschot:
 Extending Cryptographic Logics of Belief to Key Agreement Protocols.
232-243
             
- Steven M. Bellovin, Michael Merritt:
 Augmented Encrypted Key Exchange: A Password-Based Protocol Secure against Dictionary Attacks and Password File Compromise.
244-250
             
Copyright © Sun Mar 14 22:57:23 2010
 by Michael Ley (ley@uni-trier.de)