ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Proceedings of the 5th ACM conference on Computer and communications security - CCS '98
Latest Publications
TOTAL DOCUMENTS
18
(FIVE YEARS 0)
H-INDEX
13
(FIVE YEARS 0)
Published By ACM Press
1581130074
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Public-key cryptography and password protocols
Proceedings of the 5th ACM conference on Computer and communications security - CCS '98
◽
10.1145/288090.288118
◽
1998
◽
Cited By ~ 48
Author(s):
Shai Halevi
◽
Hugo Krawczyk
Keyword(s):
Public Key Cryptography
◽
Public Key
Download Full-text
A specification of Java loading and bytecode verification
Proceedings of the 5th ACM conference on Computer and communications security - CCS '98
◽
10.1145/288090.288104
◽
1998
◽
Cited By ~ 28
Author(s):
Allen Goldberg
Keyword(s):
Bytecode Verification
Download Full-text
Temporal sequence learning and data reduction for anomaly detection
Proceedings of the 5th ACM conference on Computer and communications security - CCS '98
◽
10.1145/288090.288122
◽
1998
◽
Cited By ~ 47
Author(s):
Terran Lane
◽
Carla E. Brodley
Keyword(s):
Anomaly Detection
◽
Data Reduction
◽
Sequence Learning
◽
Temporal Sequence
Download Full-text
A new public key cryptosystem based on higher residues
Proceedings of the 5th ACM conference on Computer and communications security - CCS '98
◽
10.1145/288090.288106
◽
1998
◽
Cited By ~ 129
Author(s):
David Naccache
◽
Jacques Stern
Keyword(s):
Public Key
◽
Public Key Cryptosystem
◽
New Public
Download Full-text
A security architecture for computational grids
Proceedings of the 5th ACM conference on Computer and communications security - CCS '98
◽
10.1145/288090.288111
◽
1998
◽
Cited By ~ 558
Author(s):
Ian Foster
◽
Carl Kesselman
◽
Gene Tsudik
◽
Steven Tuecke
Keyword(s):
Computational Grids
◽
Security Architecture
Download Full-text
Communication-efficient anonymous group identification
Proceedings of the 5th ACM conference on Computer and communications security - CCS '98
◽
10.1145/288090.288110
◽
1998
◽
Cited By ~ 20
Author(s):
Afredo De Santis
◽
Giovanni Di Crescenzo
◽
Giuseppe Persiano
Keyword(s):
Group Identification
Download Full-text
Anonymity on the Internet (panel)
Proceedings of the 5th ACM conference on Computer and communications security - CCS '98
◽
10.1145/288090.288100
◽
1998
◽
Keyword(s):
The Internet
Download Full-text
A practical secure physical random bit generator
Proceedings of the 5th ACM conference on Computer and communications security - CCS '98
◽
10.1145/288090.288114
◽
1998
◽
Cited By ~ 14
Author(s):
Markus Jakobsson
◽
Elizabeth Shriver
◽
Bruce K. Hillyer
◽
Ari Juels
Keyword(s):
Random Bit Generator
Download Full-text
An efficient non-interactive statistical zero-knowledge proof system for quasi-safe prime products
Proceedings of the 5th ACM conference on Computer and communications security - CCS '98
◽
10.1145/288090.288108
◽
1998
◽
Cited By ~ 31
Author(s):
Rosario Gennaro
◽
Daniele Micciancio
◽
Tal Rabin
Keyword(s):
Proof System
◽
Zero Knowledge
◽
Zero Knowledge Proof
Download Full-text
Key management for encrypted broadcast
Proceedings of the 5th ACM conference on Computer and communications security - CCS '98
◽
10.1145/288090.288096
◽
1998
◽
Cited By ~ 7
Author(s):
Avishai Wool
Keyword(s):
Key Management
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close