2nd ACM Conference on Computer and Communications Security, Nov. 2-4 1994, Fairfax, Virginia

Front Cover

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

Wednesday November
1
Secure Wireless LANs
10
A File System Integrity Checker
18
Cryptography 1
28
Exchange of Patient Records Prototype Implementation of a Security Attributes
30
A ProcessOriented Methodology for Assessing and Improving Software Trustwor
39
Towards Acceptable Key Escrow Systems
51
Protocol Failure in the Escrowed Encryption Standard
59
Anonymous Credit Cards
108
An Efficient Multiversion Algorithm For Secure Servicing Of Transaction Reads
118
A Temporal Authorization Model
126
Propagation of Authorizations in Distributed Database Systems
136
The Design of SubstitutionPermutation Networks Resistant to Differential
148
Authentication Codes that Are rfold Secure Against Spoofing
166
New Protocols for ThirdPartyBased Authentication and Secure Broadcast
176
How to Simultaneously Exchange Secrets by General Assumptions
184

Reliable and Atomic Group Multicast in Rampart
68
n Key Distribution via True Broadcasting
81
Conditionally Secure Secret Sharing Schemes with Disenrollment Capability
89
MetaElGamal signature schemes
96
A Key Distribution Method for ObjectBased Protection
193
Parallel Collision Search with Application to Hash Functions and Discrete Logarithms
210
Copyright

Bibliographic information