ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Proceedings of the 9th ACM conference on Computer and communications security - CCS '02
Latest Publications
TOTAL DOCUMENTS
27
(FIVE YEARS 0)
H-INDEX
20
(FIVE YEARS 0)
Published By ACM Press
1581136129
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Authenticated-encryption with associated-data
Proceedings of the 9th ACM conference on Computer and communications security - CCS '02
◽
10.1145/586110.586125
◽
2002
◽
Cited By ~ 114
Author(s):
Phillip Rogaway
Keyword(s):
Authenticated Encryption
◽
Associated Data
Download Full-text
A temporal key management scheme for secure broadcasting of XML documents
Proceedings of the 9th ACM conference on Computer and communications security - CCS '02
◽
10.1145/586110.586116
◽
2002
◽
Cited By ~ 21
Author(s):
Elisa Bertino
◽
Barbara Carminati
◽
Elena Ferrari
Keyword(s):
Key Management
◽
Xml Documents
◽
Management Scheme
◽
Key Management Scheme
Download Full-text
Almost entirely correct mixing with applications to voting
Proceedings of the 9th ACM conference on Computer and communications security - CCS '02
◽
10.1145/586110.586121
◽
2002
◽
Cited By ~ 34
Author(s):
Dan Boneh
◽
Philippe Golle
Download Full-text
Efficient, DoS-resistant, secure key exchange for internet protocols
Proceedings of the 9th ACM conference on Computer and communications security - CCS '02
◽
10.1145/586110.586118
◽
2002
◽
Cited By ~ 16
Author(s):
William Aiello
◽
Steven M. Bellovin
◽
Matt Blaze
◽
John Ioannidis
◽
Omer Reingold
◽
...
Keyword(s):
Key Exchange
◽
Internet Protocols
Download Full-text
Authenticated encryption in SSH
Proceedings of the 9th ACM conference on Computer and communications security - CCS '02
◽
10.1145/586110.586112
◽
2002
◽
Cited By ~ 27
Author(s):
Mihir Bellare
◽
Tadayoshi Kohno
◽
Chanathip Namprempre
Keyword(s):
Authenticated Encryption
Download Full-text
Policy algebras for access control the predicate case
Proceedings of the 9th ACM conference on Computer and communications security - CCS '02
◽
10.1145/586110.586134
◽
2002
◽
Cited By ~ 6
Author(s):
Duminda Wijesekera
◽
Sushil Jajodia
Keyword(s):
Access Control
Download Full-text
Mimicry attacks on host-based intrusion detection systems
Proceedings of the 9th ACM conference on Computer and communications security - CCS '02
◽
10.1145/586110.586145
◽
2002
◽
Cited By ~ 277
Author(s):
David Wagner
◽
Paolo Soto
Keyword(s):
Intrusion Detection
◽
Intrusion Detection Systems
◽
Detection Systems
Download Full-text
DRM
Proceedings of the 9th ACM conference on Computer and communications security - CCS '02
◽
10.1145/586110.586122
◽
2002
◽
Cited By ~ 9
Author(s):
L. Jean Camp
Download Full-text
A reputation-based approach for choosing reliable resources in peer-to-peer networks
Proceedings of the 9th ACM conference on Computer and communications security - CCS '02
◽
10.1145/586110.586138
◽
2002
◽
Cited By ~ 123
Author(s):
Ernesto Damiani
◽
De Capitani di Vimercati
◽
Stefano Paraboschi
◽
Pierangela Samarati
◽
Fabio Violante
Keyword(s):
Peer To Peer
◽
Peer Networks
◽
Peer To Peer Networks
Download Full-text
Efficient packet marking for large-scale IP traceback
Proceedings of the 9th ACM conference on Computer and communications security - CCS '02
◽
10.1145/586110.586128
◽
2002
◽
Cited By ~ 35
Author(s):
Michael T. Goodrich
Keyword(s):
Large Scale
◽
Ip Traceback
◽
Packet Marking
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close