ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Proceedings of the 1st ACM conference on Computer and communications security - CCS '93
Latest Publications
TOTAL DOCUMENTS
30
(FIVE YEARS 0)
H-INDEX
14
(FIVE YEARS 0)
Published By ACM Press
0897916298
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Securing a global village and its resources
Proceedings of the 1st ACM conference on Computer and communications security - CCS '93
◽
10.1145/168588.168613
◽
1993
◽
Cited By ~ 1
Author(s):
Hank M. Kluepfel
Keyword(s):
Global Village
Download Full-text
A new signature scheme based on the DSA giving message recovery
Proceedings of the 1st ACM conference on Computer and communications security - CCS '93
◽
10.1145/168588.168595
◽
1993
◽
Cited By ~ 106
Author(s):
Kaisa Nyberg
◽
Rainer A. Rueppel
Keyword(s):
Signature Scheme
◽
Message Recovery
Download Full-text
Denial of service
Proceedings of the 1st ACM conference on Computer and communications security - CCS '93
◽
10.1145/168588.168607
◽
1993
◽
Cited By ~ 24
Author(s):
Roger M. Needham
Keyword(s):
Denial Of Service
Download Full-text
Why cryptosystems fail
Proceedings of the 1st ACM conference on Computer and communications security - CCS '93
◽
10.1145/168588.168615
◽
1993
◽
Cited By ~ 98
Author(s):
Ross Anderson
Download Full-text
Extending cryptographic logics of belief to key agreement protocols
Proceedings of the 1st ACM conference on Computer and communications security - CCS '93
◽
10.1145/168588.168617
◽
1993
◽
Cited By ~ 49
Author(s):
Paul van Oorschot
Keyword(s):
Key Agreement
◽
Agreement Protocols
Download Full-text
Towards practical “proven secure” authenticated key distribution
Proceedings of the 1st ACM conference on Computer and communications security - CCS '93
◽
10.1145/168588.168616
◽
1993
◽
Cited By ~ 10
Author(s):
Yvo Desmedt
◽
Mike Burmester
Keyword(s):
Key Distribution
Download Full-text
A particular solution to provide secure communications in an Ethernet environment
Proceedings of the 1st ACM conference on Computer and communications security - CCS '93
◽
10.1145/168588.168591
◽
1993
◽
Cited By ~ 1
Author(s):
Miguel Soriano
◽
Jordi Forné
◽
Francisco Recacha
◽
José L. Melús
Keyword(s):
Secure Communications
◽
Particular Solution
Download Full-text
Differential cryptanalysis of hash functions based on block ciphers
Proceedings of the 1st ACM conference on Computer and communications security - CCS '93
◽
10.1145/168588.168611
◽
1993
◽
Cited By ~ 10
Author(s):
Bart Preneel
◽
Rene Govaerts
◽
Joos Vandewalle
Keyword(s):
Hash Functions
◽
Block Ciphers
◽
Differential Cryptanalysis
Download Full-text
On simple and secure key distribution
Proceedings of the 1st ACM conference on Computer and communications security - CCS '93
◽
10.1145/168588.168594
◽
1993
◽
Cited By ~ 8
Author(s):
Gene Tsudik
◽
Els Van Herreweghen
Keyword(s):
Key Distribution
Download Full-text
Random oracles are practical
Proceedings of the 1st ACM conference on Computer and communications security - CCS '93
◽
10.1145/168588.168596
◽
1993
◽
Cited By ~ 2001
Author(s):
Mihir Bellare
◽
Phillip Rogaway
Keyword(s):
Random Oracles
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close