The SCEAS System
Navigation Menu

Conferences in DBLP

European Symposium on Research in Computer Security (ESORICS) (esorics)
1992 (conf/esorics/1992)

  1. John A. Bull, Li Gong, Karen R. Sollins
    Towards Security in an Open Systems Federation. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1992, pp:3-20 [Conf]
  2. Udo Kelter
    Type-Level Access Controls for Distributed Structurally Object-Oriented Database Systems. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1992, pp:21-40 [Conf]
  3. Volker Kessler
    On the Chinese Wall Model. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1992, pp:41-54 [Conf]
  4. Jingsha He, Virgil D. Gligor
    Formal Methods and Automated Tool for Timing-Channel Identification in TCB Source Code. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1992, pp:57-76 [Conf]
  5. Marie-Jeanne Toussaint
    Separating the Specification and Implementation Phases in Cryptology. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1992, pp:77-102 [Conf]
  6. Andrew J. I. Jones, Marek J. Sergot
    Formal Specification of Security Requirements using the Theory of Normative Positions. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1992, pp:103-121 [Conf]
  7. Yvo Desmedt
    Breaking the Traditional Computer Security Barriers. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1992, pp:125-138 [Conf]
  8. Ralf C. Hauser, E. Stewart Lee
    Verification and Modelling of Authentication Protocols. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1992, pp:141-154 [Conf]
  9. Refik Molva, Gene Tsudik, Els Van Herreweghen, Stefano Zatti
    KryptoKnight Authentication and Key Distribution System. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1992, pp:155-174 [Conf]
  10. Anas Tarah, Christian Huitema
    Associating Metrics to Certification Paths. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1992, pp:175-189 [Conf]
  11. Jean-Charles Fabre, Brian Randell
    An Object-Oriented View of Fragmented Data Processing for Fault and Intrusion Tolerance in Distributed Systems. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1992, pp:193-208 [Conf]
  12. Michael Wang, Andrzej M. Goscinski
    The Development and Testing of the Identity-Based Conference Key Distribution System for the RHODOS Distributed System. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1992, pp:209-228 [Conf]
  13. Gene Tsudik
    Policy Enforcement in Stub Autonomous Domains. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1992, pp:229-257 [Conf]
  14. Kwok-Yan Lam, Dieter Gollmann
    Freshness Assurance of Authentication Protocols. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1992, pp:261-272 [Conf]
  15. Colin Boyd
    A Formal Framework for Authentication. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1992, pp:273-292 [Conf]
  16. Kwok-Yan Lam, Thomas Beth
    Timely Authentication in Distributed Systems. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1992, pp:293-303 [Conf]
  17. Ravi S. Sandhu, Sushil Jajodia
    Polyinstantation for Cover Stories. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1992, pp:307-328 [Conf]
  18. Iwen E. Kang, Thomas F. Keefe
    On Transaction Processing for Multilevel Secure Replicated Databases. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1992, pp:329-348 [Conf]
  19. Günther Pernul
    Security Constraint Processing in Multilevel Secure AMAC Schemata. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1992, pp:349-370 [Conf]
  20. Bruno d'Ausbourg, Jean-Henri Llareus
    M2S: A Machine for Multilevel Security. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1992, pp:373-392 [Conf]
  21. Christel Calas
    GDoM: a Multilevel Document Manager. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1992, pp:393-408 [Conf]
  22. Ross J. Anderson
    UEPS - A Second Generation Electronic Wallet. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1992, pp:411-418 [Conf]
  23. Joan Daemen, René Govaerts, Joos Vandewalle
    A Hardware Design Model for Cryptographic Algorithms. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1992, pp:419-434 [Conf]
  24. Naji Habra, Baudouin Le Charlier, Abdelaziz Mounji, Isabelle Mathieu
    ASAX: Software Architecture and Rule-Based Language for Universal Audit Trail Analysis. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1992, pp:435-450 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002