Open questions, talk abstracts, and summary of discussions / J. Feigenbaum ; M. Merritt |
Formal definitions for secure distributed protocols / D. Beaver |
Perfect privacy for two-party protocols |
On the structure of secret key exchange protocols / M. Bellare ; L. Cowen ; S. Goldwasser |
Privacy-enhanced electronic mail / M. Bishop |
Program result checking against adaptive programs and in cryptographic settings / M. Blum ; M. Luby ; R. Rubinfeld |
The scope of a logic of authentication / M. Burrows ; M. Abadi ; R. Needham |
Secure policy enforcement in internetworks / D. Estrin ; G. Tsudik |
On expected polynomial time simulation of zero knowledge protocols / U. Feige ; A. Shmir |
Cryptographic protection of databases and software / M. Y. Liberman ; R. N. Wright |
Secret bit transmission using a random deal of cards / M. J. Fischer ; M. S. Paterson ; C. Rackoff |
Security against replay chosen-ciphertext attack / Z. Galil ; S. Haber ; M. Yung |
New directions in testing / R. J. Lipton |
Towards a theory of cryptographic systems: A critique of crypto-complexity |
Feedback in discrete communication / A. Orlitsky |
On necessary conditions for secure distributed computation / R. Ostrovsky ; M. Young |
Secure IX network / J. Reeds |
Reasoning about cryptographic protocols / M.-J. Toussaint ; P. Wolper |
Open questions, talk abstracts, and summary of discussions / J. Feigenbaum ; M. Merritt |
Formal definitions for secure distributed protocols / D. Beaver |
Perfect privacy for two-party protocols |
On the structure of secret key exchange protocols / M. Bellare ; L. Cowen ; S. Goldwasser |
Privacy-enhanced electronic mail / M. Bishop |
Program result checking against adaptive programs and in cryptographic settings / M. Blum ; M. Luby ; R. Rubinfeld |