Proceedings: 1995 IEEE Symposium on Security and Privacy, May 8-10, 1995, Oakland, California |
Contents
Cryptographic Credit Control in PrePayment Metering Systems | 15 |
Holding Intruders Accountable on the Internet | 39 |
What to do While Waiting for the Millenium | 63 |
Copyright | |
12 other sections not shown
Other editions - View all
Common terms and phrases
able accountability actions addition allow analysis application approach architecture associated assume assumption attacker authentication authority called capacity certificate client communication Computer connection consider consists contains correct covert channel create database definition depends described determine developed discussed distributed domain effect elements encrypted entity example execution Figure function GARNETS given host IEEE implementation initial input labels load mechanism multilevel named object operation output performance period possible present principal problem proof properties protection protocol prove Pump realtime received refer relation Report result revocation satisfies says scheduling scheme secret separability server shared signed single slots specification standard statement task techniques tion traces transaction trusted write