Conferences in DBLP
Michael K. Reiter Trustworthy Services and the Biological Analogy. [Citation Graph (0, 0)][DBLP ] ESORICS, 2007, pp:1- [Conf ] Gilles Barthe , Tamara Rezk , Alejandro Russo , Andrei Sabelfeld Security of Multithreaded Programs by Compilation. [Citation Graph (0, 0)][DBLP ] ESORICS, 2007, pp:2-18 [Conf ] Lujo Bauer , Scott Garriss , Michael K. Reiter Efficient Proving for Practical Distributed Access-Control Systems. [Citation Graph (0, 0)][DBLP ] ESORICS, 2007, pp:19-37 [Conf ] Paul Z. Kolano Maintaining High Performance Communication Under Least Privilege Using Dynamic Perimeter Control. [Citation Graph (0, 0)][DBLP ] ESORICS, 2007, pp:38-54 [Conf ] Bo Luo , Dongwon Lee , Peng Liu Pragmatic XML Access Control Using Off-the-Shelf RDBMS. [Citation Graph (0, 0)][DBLP ] ESORICS, 2007, pp:55-71 [Conf ] Qun Ni , Dan Lin , Elisa Bertino , Jorge Lobo Conditional Privacy-Aware Role Based Access Control. [Citation Graph (0, 0)][DBLP ] ESORICS, 2007, pp:72-89 [Conf ] Qihua Wang , Ninghui Li Satisfiability and Resiliency in Workflow Systems. [Citation Graph (0, 0)][DBLP ] ESORICS, 2007, pp:90-105 [Conf ] Shaddin F. Doghmi , Joshua D. Guttman , F. Javier Thayer Completeness of the Authentication Tests. [Citation Graph (0, 0)][DBLP ] ESORICS, 2007, pp:106-121 [Conf ] Eugene Y. Vasserman , Nicholas Hopper , John Laxson , James Tyra SilentKnock: Practical, Provably Undetectable Authentication. [Citation Graph (0, 0)][DBLP ] ESORICS, 2007, pp:122-138 [Conf ] Michel Abdalla , Eike Kiltz , Gregory Neven Generalized Key Delegation for Hierarchical Identity-Based Encryption. [Citation Graph (0, 0)][DBLP ] ESORICS, 2007, pp:139-154 [Conf ] Alex X. Liu Change-Impact Analysis of Firewall Policies. [Citation Graph (0, 0)][DBLP ] ESORICS, 2007, pp:155-170 [Conf ] Valentina Ciriani , Sabrina De Capitani di Vimercati , Sara Foresti , Sushil Jajodia , Stefano Paraboschi , Pierangela Samarati Fragmentation and Encryption to Enforce Privacy in Data Storage. [Citation Graph (0, 0)][DBLP ] ESORICS, 2007, pp:171-186 [Conf ] Roberto Di Pietro , Refik Molva Information Confinement, Privacy, and Security in RFID Systems. [Citation Graph (0, 0)][DBLP ] ESORICS, 2007, pp:187-202 [Conf ] Moritz Y. Becker , Sebastian Nanz A Logic for State-Modifying Authorization Policies. [Citation Graph (0, 0)][DBLP ] ESORICS, 2007, pp:203-218 [Conf ] Arnab Roy , Anupam Datta , Ante Derek , John C. Mitchell Inductive Proofs of Computational Secrecy. [Citation Graph (0, 0)][DBLP ] ESORICS, 2007, pp:219-234 [Conf ] Ron van der Meyden What, Indeed, Is Intransitive Noninterference? [Citation Graph (0, 0)][DBLP ] ESORICS, 2007, pp:235-250 [Conf ] Frederic Montagut , Refik Molva Traceability and Integrity of Execution in Distributed Workflow Management Systems. [Citation Graph (0, 0)][DBLP ] ESORICS, 2007, pp:251-266 [Conf ] Sachiko Yoshihama , Takeo Yoshizawa , Yuji Watanabe , Michiharu Kudo , Kazuko Oyanagi Dynamic Information Flow Control Architecture for Web Applications. [Citation Graph (0, 0)][DBLP ] ESORICS, 2007, pp:267-282 [Conf ] Xiapu Luo , Edmond W. W. Chan , Rocky K. C. Chang Cloak: A Ten-Fold Way for Reliable Covert Communications. [Citation Graph (0, 0)][DBLP ] ESORICS, 2007, pp:283-298 [Conf ] Jun Shao , Zhenfu Cao , Licheng Wang , Rongxing Lu Efficient Password-Based Authenticated Key Exchange Without Public Information. [Citation Graph (0, 0)][DBLP ] ESORICS, 2007, pp:299-310 [Conf ] Konstantinos Chalkias , Dimitrios Hristu-Varsakelis , George Stephanides Improved Anonymous Timed-Release Encryption. [Citation Graph (0, 0)][DBLP ] ESORICS, 2007, pp:311-326 [Conf ] Sergei Evdokimov , Oliver Günther Encryption Techniques for Secure Database Outsourcing. [Citation Graph (0, 0)][DBLP ] ESORICS, 2007, pp:327-342 [Conf ] Krzysztof Golofit Click Passwords Under Investigation. [Citation Graph (0, 0)][DBLP ] ESORICS, 2007, pp:343-358 [Conf ] Sonia Chiasson , Paul C. van Oorschot , Robert Biddle Graphical Password Authentication Using Cued Click Points. [Citation Graph (0, 0)][DBLP ] ESORICS, 2007, pp:359-374 [Conf ] Daniel J. Dougherty , Kathi Fisler , Shriram Krishnamurthi Obligations and Their Interaction with Programs. [Citation Graph (0, 0)][DBLP ] ESORICS, 2007, pp:375-389 [Conf ] Aldar C.-F. Chan , Claude Castelluccia On the Privacy of Concealed Data Aggregation. [Citation Graph (0, 0)][DBLP ] ESORICS, 2007, pp:390-405 [Conf ] Véronique Cortier , Bogdan Warinschi , Eugen Zalinescu Synthesizing Secure Protocols. [Citation Graph (0, 0)][DBLP ] ESORICS, 2007, pp:406-421 [Conf ] Véronique Cortier , Ralf Küsters , Bogdan Warinschi A Cryptographic Model for Branching Time Security Properties - The Case of Contract Signing Protocols. [Citation Graph (0, 0)][DBLP ] ESORICS, 2007, pp:422-437 [Conf ] Sigrid Gürgens , Carsten Rudolph , Dirk Scheuermann , Marion Atts , Rainer Plaga Security Evaluation of Scenarios Based on the TCG's TPM Specification. [Citation Graph (0, 0)][DBLP ] ESORICS, 2007, pp:438-453 [Conf ] Kerstin Lemke-Rust , Christof Paar Analyzing Side Channel Leakage of Masked Implementations with Stochastic Methods. [Citation Graph (0, 0)][DBLP ] ESORICS, 2007, pp:454-468 [Conf ] André Adelsbach , Ulrich Greveler Insider Attacks Enabling Data Broadcasting on Crypto-Enforced Unicast Links. [Citation Graph (0, 0)][DBLP ] ESORICS, 2007, pp:469-484 [Conf ] Vidyaraman Sankaranarayanan , Madhusudhanan Chandrasekaran , Shambhu J. Upadhyaya Towards Modeling Trust Based Decisions: A Game Theoretic Approach. [Citation Graph (0, 0)][DBLP ] ESORICS, 2007, pp:485-500 [Conf ] Gabriel López Millán , Óscar Cánovas Reverte , Diego R. López , Antonio F. Gómez-Skarmeta Extending the Common Services of eduGAIN with a Credential Conversion Service. [Citation Graph (0, 0)][DBLP ] ESORICS, 2007, pp:501-514 [Conf ] Mikhail J. Atallah , Marina Blanton , Keith B. Frikken Incorporating Temporal Capabilities in Existing Key Management Schemes. [Citation Graph (0, 0)][DBLP ] ESORICS, 2007, pp:515-530 [Conf ] Manuel Hilty , Alexander Pretschner , David A. Basin , Christian Schaefer , Thomas Walter A Policy Language for Distributed Usage Control. [Citation Graph (0, 0)][DBLP ] ESORICS, 2007, pp:531-546 [Conf ] Nayantara Mallesh , Matthew Wright Countering Statistical Disclosure with Receiver-Bound Cover Traffic. [Citation Graph (0, 0)][DBLP ] ESORICS, 2007, pp:547-562 [Conf ] Hongxia Jin , Jeffery Lotspiech Renewable Traitor Tracing: A Trace-Revoke-Trace System For Anonymous Attack. [Citation Graph (0, 0)][DBLP ] ESORICS, 2007, pp:563-577 [Conf ] Daniel J. Dougherty , Claude Kirchner , Hélène Kirchner , Anderson Santana de Oliveira Modular Access Control Via Strategic Rewriting. [Citation Graph (0, 0)][DBLP ] ESORICS, 2007, pp:578-593 [Conf ] Juan Carlos López Pimentel , Raul Monroy , Dieter Hutter On the Automated Correction of Security Protocols Susceptible to a Replay Attack. [Citation Graph (0, 0)][DBLP ] ESORICS, 2007, pp:594-609 [Conf ] Steve Kremer , Laurent Mazaré Adaptive Soundness of Static Equivalence. [Citation Graph (0, 0)][DBLP ] ESORICS, 2007, pp:610-625 [Conf ]