Conferences in DBLP
John A. Bull , Li Gong , Karen R. Sollins Towards Security in an Open Systems Federation. [Citation Graph (0, 0)][DBLP ] ESORICS, 1992, pp:3-20 [Conf ] Udo Kelter Type-Level Access Controls for Distributed Structurally Object-Oriented Database Systems. [Citation Graph (0, 0)][DBLP ] ESORICS, 1992, pp:21-40 [Conf ] Volker Kessler On the Chinese Wall Model. [Citation Graph (0, 0)][DBLP ] ESORICS, 1992, pp:41-54 [Conf ] Jingsha He , Virgil D. Gligor Formal Methods and Automated Tool for Timing-Channel Identification in TCB Source Code. [Citation Graph (0, 0)][DBLP ] ESORICS, 1992, pp:57-76 [Conf ] Marie-Jeanne Toussaint Separating the Specification and Implementation Phases in Cryptology. [Citation Graph (0, 0)][DBLP ] ESORICS, 1992, pp:77-102 [Conf ] Andrew J. I. Jones , Marek J. Sergot Formal Specification of Security Requirements using the Theory of Normative Positions. [Citation Graph (0, 0)][DBLP ] ESORICS, 1992, pp:103-121 [Conf ] Yvo Desmedt Breaking the Traditional Computer Security Barriers. [Citation Graph (0, 0)][DBLP ] ESORICS, 1992, pp:125-138 [Conf ] Ralf C. Hauser , E. Stewart Lee Verification and Modelling of Authentication Protocols. [Citation Graph (0, 0)][DBLP ] ESORICS, 1992, pp:141-154 [Conf ] Refik Molva , Gene Tsudik , Els Van Herreweghen , Stefano Zatti KryptoKnight Authentication and Key Distribution System. [Citation Graph (0, 0)][DBLP ] ESORICS, 1992, pp:155-174 [Conf ] Anas Tarah , Christian Huitema Associating Metrics to Certification Paths. [Citation Graph (0, 0)][DBLP ] ESORICS, 1992, pp:175-189 [Conf ] Jean-Charles Fabre , Brian Randell An Object-Oriented View of Fragmented Data Processing for Fault and Intrusion Tolerance in Distributed Systems. [Citation Graph (0, 0)][DBLP ] ESORICS, 1992, pp:193-208 [Conf ] Michael Wang , Andrzej M. Goscinski The Development and Testing of the Identity-Based Conference Key Distribution System for the RHODOS Distributed System. [Citation Graph (0, 0)][DBLP ] ESORICS, 1992, pp:209-228 [Conf ] Gene Tsudik Policy Enforcement in Stub Autonomous Domains. [Citation Graph (0, 0)][DBLP ] ESORICS, 1992, pp:229-257 [Conf ] Kwok-Yan Lam , Dieter Gollmann Freshness Assurance of Authentication Protocols. [Citation Graph (0, 0)][DBLP ] ESORICS, 1992, pp:261-272 [Conf ] Colin Boyd A Formal Framework for Authentication. [Citation Graph (0, 0)][DBLP ] ESORICS, 1992, pp:273-292 [Conf ] Kwok-Yan Lam , Thomas Beth Timely Authentication in Distributed Systems. [Citation Graph (0, 0)][DBLP ] ESORICS, 1992, pp:293-303 [Conf ] Ravi S. Sandhu , Sushil Jajodia Polyinstantation for Cover Stories. [Citation Graph (0, 0)][DBLP ] ESORICS, 1992, pp:307-328 [Conf ] Iwen E. Kang , Thomas F. Keefe On Transaction Processing for Multilevel Secure Replicated Databases. [Citation Graph (0, 0)][DBLP ] ESORICS, 1992, pp:329-348 [Conf ] Günther Pernul Security Constraint Processing in Multilevel Secure AMAC Schemata. [Citation Graph (0, 0)][DBLP ] ESORICS, 1992, pp:349-370 [Conf ] Bruno d'Ausbourg , Jean-Henri Llareus M2 S: A Machine for Multilevel Security. [Citation Graph (0, 0)][DBLP ] ESORICS, 1992, pp:373-392 [Conf ] Christel Calas GDoM: a Multilevel Document Manager. [Citation Graph (0, 0)][DBLP ] ESORICS, 1992, pp:393-408 [Conf ] Ross J. Anderson UEPS - A Second Generation Electronic Wallet. [Citation Graph (0, 0)][DBLP ] ESORICS, 1992, pp:411-418 [Conf ] Joan Daemen , René Govaerts , Joos Vandewalle A Hardware Design Model for Cryptographic Algorithms. [Citation Graph (0, 0)][DBLP ] ESORICS, 1992, pp:419-434 [Conf ] Naji Habra , Baudouin Le Charlier , Abdelaziz Mounji , Isabelle Mathieu ASAX: Software Architecture and Rule-Based Language for Universal Audit Trail Analysis. [Citation Graph (0, 0)][DBLP ] ESORICS, 1992, pp:435-450 [Conf ]