Default Cover Image

1983 IEEE Symposium on Security and Privacy

April 25 1983 to April 27 1983

Oakland, CA, USA

Table of Contents

General Chairman's MessageFull-text access may be available. Sign in or learn about subscription options.pp. iii-iii
Program Chairman's MessageFull-text access may be available. Sign in or learn about subscription options.pp. v-v
General Chairman?s MessageFreely available from IEEE.pp. iii
Program Chairman?s MessageFreely available from IEEE.pp. v
Using Views in a Multilevel Secure Database Management SystemFull-text access may be available. Sign in or learn about subscription options.pp. 4-4
FingerprintingFull-text access may be available. Sign in or learn about subscription options.pp. 18-18
The Many-Time Pad: Theme and VariationsFull-text access may be available. Sign in or learn about subscription options.pp. 23-23
Message Authentication with Manipulation Detection CodeFull-text access may be available. Sign in or learn about subscription options.pp. 33-33
Joint Encryption and Error-Correction CodingFull-text access may be available. Sign in or learn about subscription options.pp. 55-55
Verification of Treaty Compliance -- RevisitedFull-text access may be available. Sign in or learn about subscription options.pp. 61-61
Recent Advances in the design and implementation of Large Integer Factorization AlgorithmsFull-text access may be available. Sign in or learn about subscription options.pp. 67-67
New Key Generation Algorithms for Multilevel SecurityFull-text access may be available. Sign in or learn about subscription options.pp. 72-72
Modified Architecture for the Sub-Keys ModelFull-text access may be available. Sign in or learn about subscription options.pp. 79-79
Evaluating Security Properties of Computer SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 89-89
Security Enhancement through Product EvaluationFull-text access may be available. Sign in or learn about subscription options.pp. 96-96
An Approach to Identification of Minimum TCB Requirements for Various Threat/Risk EnvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 102-102
The Channel Assignment ProblemFull-text access may be available. Sign in or learn about subscription options.pp. 107-107
SDC Secure Release Terminal ProjectFull-text access may be available. Sign in or learn about subscription options.pp. 113-113
Processor-per-Domain Guard ArchitectureFull-text access may be available. Sign in or learn about subscription options.pp. 120-120
Packet Switched NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 121-121
A Distributed Secure SystemFull-text access may be available. Sign in or learn about subscription options.pp. 127-127
Securing Networks: End-to-End Encrpytion vs. Link Encryption and Trusted SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 136-136
Operating Systems and Security Models
A Note on the Denial-of-Service ProblemFull-text access may be available. Sign in or learn about subscription options.pp. 139
The VERUS™ Design Verification SystemFull-text access may be available. Sign in or learn about subscription options.pp. 150-150
Secure Computer Systems: A RetrospectiveFull-text access may be available. Sign in or learn about subscription options.pp. 161-161
Showing 25 out of 25