C
search
search
reviewers
reviewers
feeds
feeds
assignments
assignments
settings
logout
Network Threats
1996
1997
1998
1996
1998
Keyphrases
Publications
volume 38, 1998
Network Threats, Proceedings of a DIMACS Workshop, December 2-4, 1996
Network Threats
38 (1998)
1996
Mike Burmester
,
Yvo Desmedt
,
Gregory Kabatianskii
Trust and security: A new look at the Byzantine generals problem.
Network Threats
(1996)
Sarvar Patel
Information leakage in encrypted key exchange.
Network Threats
(1996)
Robert J. Hall
Channels: Avoiding unwanted electronic mail.
Network Threats
(1996)
Foreword.
Network Threats
(1996)
Dan S. Wallach
,
Jim A. Roskind
,
Edward W. Felten
Flexible, extensible Java security using digital signatures.
Network Threats
(1996)
Marc Joye
,
Jean-Jacques Quisquater
Cryptanalysis of RSA-type cryptosystems: A visit.
Network Threats
(1996)
Dan Zhou
,
Shiu-Kai Chin
Verifying privacy enhanced mail functions with higher order logic.
Network Threats
(1996)
Cynthia Cullen
Demonstration of hacker techniques.
Network Threats
(1996)
Preface.
Network Threats
(1996)
Catherine A. Meadows
A representation of protocol attacks for risk assessment.
Network Threats
(1996)
Adam Shostack
Observed weaknesses in security dynamics' client/server protocol.
Network Threats
(1996)
Drew Dean
Web security: A high level view.
Network Threats
(1996)