The SCEAS System
Navigation Menu

Conferences in DBLP

European Symposium on Research in Computer Security (ESORICS) (esorics)
2007 (conf/esorics/2007)

  1. Michael K. Reiter
    Trustworthy Services and the Biological Analogy. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2007, pp:1- [Conf]
  2. Gilles Barthe, Tamara Rezk, Alejandro Russo, Andrei Sabelfeld
    Security of Multithreaded Programs by Compilation. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2007, pp:2-18 [Conf]
  3. Lujo Bauer, Scott Garriss, Michael K. Reiter
    Efficient Proving for Practical Distributed Access-Control Systems. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2007, pp:19-37 [Conf]
  4. Paul Z. Kolano
    Maintaining High Performance Communication Under Least Privilege Using Dynamic Perimeter Control. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2007, pp:38-54 [Conf]
  5. Bo Luo, Dongwon Lee, Peng Liu
    Pragmatic XML Access Control Using Off-the-Shelf RDBMS. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2007, pp:55-71 [Conf]
  6. Qun Ni, Dan Lin, Elisa Bertino, Jorge Lobo
    Conditional Privacy-Aware Role Based Access Control. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2007, pp:72-89 [Conf]
  7. Qihua Wang, Ninghui Li
    Satisfiability and Resiliency in Workflow Systems. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2007, pp:90-105 [Conf]
  8. Shaddin F. Doghmi, Joshua D. Guttman, F. Javier Thayer
    Completeness of the Authentication Tests. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2007, pp:106-121 [Conf]
  9. Eugene Y. Vasserman, Nicholas Hopper, John Laxson, James Tyra
    SilentKnock: Practical, Provably Undetectable Authentication. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2007, pp:122-138 [Conf]
  10. Michel Abdalla, Eike Kiltz, Gregory Neven
    Generalized Key Delegation for Hierarchical Identity-Based Encryption. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2007, pp:139-154 [Conf]
  11. Alex X. Liu
    Change-Impact Analysis of Firewall Policies. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2007, pp:155-170 [Conf]
  12. Valentina Ciriani, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati
    Fragmentation and Encryption to Enforce Privacy in Data Storage. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2007, pp:171-186 [Conf]
  13. Roberto Di Pietro, Refik Molva
    Information Confinement, Privacy, and Security in RFID Systems. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2007, pp:187-202 [Conf]
  14. Moritz Y. Becker, Sebastian Nanz
    A Logic for State-Modifying Authorization Policies. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2007, pp:203-218 [Conf]
  15. Arnab Roy, Anupam Datta, Ante Derek, John C. Mitchell
    Inductive Proofs of Computational Secrecy. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2007, pp:219-234 [Conf]
  16. Ron van der Meyden
    What, Indeed, Is Intransitive Noninterference? [Citation Graph (0, 0)][DBLP]
    ESORICS, 2007, pp:235-250 [Conf]
  17. Frederic Montagut, Refik Molva
    Traceability and Integrity of Execution in Distributed Workflow Management Systems. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2007, pp:251-266 [Conf]
  18. Sachiko Yoshihama, Takeo Yoshizawa, Yuji Watanabe, Michiharu Kudo, Kazuko Oyanagi
    Dynamic Information Flow Control Architecture for Web Applications. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2007, pp:267-282 [Conf]
  19. Xiapu Luo, Edmond W. W. Chan, Rocky K. C. Chang
    Cloak: A Ten-Fold Way for Reliable Covert Communications. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2007, pp:283-298 [Conf]
  20. Jun Shao, Zhenfu Cao, Licheng Wang, Rongxing Lu
    Efficient Password-Based Authenticated Key Exchange Without Public Information. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2007, pp:299-310 [Conf]
  21. Konstantinos Chalkias, Dimitrios Hristu-Varsakelis, George Stephanides
    Improved Anonymous Timed-Release Encryption. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2007, pp:311-326 [Conf]
  22. Sergei Evdokimov, Oliver Günther
    Encryption Techniques for Secure Database Outsourcing. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2007, pp:327-342 [Conf]
  23. Krzysztof Golofit
    Click Passwords Under Investigation. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2007, pp:343-358 [Conf]
  24. Sonia Chiasson, Paul C. van Oorschot, Robert Biddle
    Graphical Password Authentication Using Cued Click Points. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2007, pp:359-374 [Conf]
  25. Daniel J. Dougherty, Kathi Fisler, Shriram Krishnamurthi
    Obligations and Their Interaction with Programs. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2007, pp:375-389 [Conf]
  26. Aldar C.-F. Chan, Claude Castelluccia
    On the Privacy of Concealed Data Aggregation. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2007, pp:390-405 [Conf]
  27. Véronique Cortier, Bogdan Warinschi, Eugen Zalinescu
    Synthesizing Secure Protocols. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2007, pp:406-421 [Conf]
  28. Véronique Cortier, Ralf Küsters, Bogdan Warinschi
    A Cryptographic Model for Branching Time Security Properties - The Case of Contract Signing Protocols. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2007, pp:422-437 [Conf]
  29. Sigrid Gürgens, Carsten Rudolph, Dirk Scheuermann, Marion Atts, Rainer Plaga
    Security Evaluation of Scenarios Based on the TCG's TPM Specification. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2007, pp:438-453 [Conf]
  30. Kerstin Lemke-Rust, Christof Paar
    Analyzing Side Channel Leakage of Masked Implementations with Stochastic Methods. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2007, pp:454-468 [Conf]
  31. André Adelsbach, Ulrich Greveler
    Insider Attacks Enabling Data Broadcasting on Crypto-Enforced Unicast Links. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2007, pp:469-484 [Conf]
  32. Vidyaraman Sankaranarayanan, Madhusudhanan Chandrasekaran, Shambhu J. Upadhyaya
    Towards Modeling Trust Based Decisions: A Game Theoretic Approach. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2007, pp:485-500 [Conf]
  33. Gabriel López Millán, Óscar Cánovas Reverte, Diego R. López, Antonio F. Gómez-Skarmeta
    Extending the Common Services of eduGAIN with a Credential Conversion Service. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2007, pp:501-514 [Conf]
  34. Mikhail J. Atallah, Marina Blanton, Keith B. Frikken
    Incorporating Temporal Capabilities in Existing Key Management Schemes. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2007, pp:515-530 [Conf]
  35. Manuel Hilty, Alexander Pretschner, David A. Basin, Christian Schaefer, Thomas Walter
    A Policy Language for Distributed Usage Control. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2007, pp:531-546 [Conf]
  36. Nayantara Mallesh, Matthew Wright
    Countering Statistical Disclosure with Receiver-Bound Cover Traffic. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2007, pp:547-562 [Conf]
  37. Hongxia Jin, Jeffery Lotspiech
    Renewable Traitor Tracing: A Trace-Revoke-Trace System For Anonymous Attack. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2007, pp:563-577 [Conf]
  38. Daniel J. Dougherty, Claude Kirchner, Hélène Kirchner, Anderson Santana de Oliveira
    Modular Access Control Via Strategic Rewriting. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2007, pp:578-593 [Conf]
  39. Juan Carlos López Pimentel, Raul Monroy, Dieter Hutter
    On the Automated Correction of Security Protocols Susceptible to a Replay Attack. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2007, pp:594-609 [Conf]
  40. Steve Kremer, Laurent Mazaré
    Adaptive Soundness of Static Equivalence. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2007, pp:610-625 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002