ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Proceedings of the 4th ACM conference on Computer and communications security - CCS '97
Latest Publications
TOTAL DOCUMENTS
17
(FIVE YEARS 0)
H-INDEX
13
(FIVE YEARS 0)
Published By ACM Press
0897919122
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Improved security bounds for pseudorandom permutations
Proceedings of the 4th ACM conference on Computer and communications security - CCS '97
◽
10.1145/266420.266452
◽
1997
◽
Cited By ~ 18
Author(s):
Jacques Patarin
Download Full-text
Secure names for bit-strings
Proceedings of the 4th ACM conference on Computer and communications security - CCS '97
◽
10.1145/266420.266430
◽
1997
◽
Cited By ~ 35
Author(s):
Stuart Haber
◽
W. Scott Stornetta
Download Full-text
The security of static typing with dynamic linking
Proceedings of the 4th ACM conference on Computer and communications security - CCS '97
◽
10.1145/266420.266428
◽
1997
◽
Cited By ~ 29
Author(s):
Drew Dean
Keyword(s):
Dynamic Linking
◽
Static Typing
Download Full-text
Authentication via keystroke dynamics
Proceedings of the 4th ACM conference on Computer and communications security - CCS '97
◽
10.1145/266420.266434
◽
1997
◽
Cited By ~ 176
Author(s):
Fabian Monrose
◽
Aviel Rubin
Keyword(s):
Keystroke Dynamics
Download Full-text
New blind signatures equivalent to factorization (extended abstract)
Proceedings of the 4th ACM conference on Computer and communications security - CCS '97
◽
10.1145/266420.266440
◽
1997
◽
Cited By ~ 22
Author(s):
David Pointcheval
◽
Jacques Stern
Keyword(s):
Blind Signatures
Download Full-text
Fair exchange with a semi-trusted third party (extended abstract)
Proceedings of the 4th ACM conference on Computer and communications security - CCS '97
◽
10.1145/266420.266424
◽
1997
◽
Cited By ~ 100
Author(s):
Matthew K. Franklin
◽
Michael K. Reiter
Keyword(s):
Third Party
◽
Fair Exchange
◽
Trusted Third Party
Download Full-text
On the importance of securing your bins
Proceedings of the 4th ACM conference on Computer and communications security - CCS '97
◽
10.1145/266420.266449
◽
1997
◽
Cited By ~ 6
Author(s):
Marc Joye
◽
Jean-Jacques Quisquater
Download Full-text
The specification and implementation of “commercial” security requirements including dynamic segregation of duties
Proceedings of the 4th ACM conference on Computer and communications security - CCS '97
◽
10.1145/266420.266447
◽
1997
◽
Cited By ~ 21
Author(s):
Simon N. Foley
Keyword(s):
Security Requirements
◽
Dynamic Segregation
◽
Specification And Implementation
Download Full-text
A new on-line cash check scheme
Proceedings of the 4th ACM conference on Computer and communications security - CCS '97
◽
10.1145/266420.266444
◽
1997
◽
Cited By ~ 7
Author(s):
Robert H. Deng
◽
Yongfei Han
◽
Albert B. Jeng
◽
Teow-Hin Ngair
Keyword(s):
Check Scheme
◽
On Line
Download Full-text
Optimistic protocols for fair exchange
Proceedings of the 4th ACM conference on Computer and communications security - CCS '97
◽
10.1145/266420.266426
◽
1997
◽
Cited By ~ 189
Author(s):
N. Asokan
◽
Matthias Schunter
◽
Michael Waidner
Keyword(s):
Fair Exchange
◽
Optimistic Protocols
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close