|
Conferences in DBLP
- Hervé Debar, Marc Dacier, Mehdi Nassehi, Andreas Wespi
Fixed vs. Variable-Length Patterns for Detecting Suspicious Process Behavior. [Citation Graph (0, 0)][DBLP] ESORICS, 1998, pp:1-15 [Conf]
- Danilo Bruschi, Emilia Rosti, R. Banfi
A Tool for Pro-active Defense Against the Buffer Overrun Attack. [Citation Graph (0, 0)][DBLP] ESORICS, 1998, pp:17-31 [Conf]
- Simon N. Foley
A Kernelized Architecture for Multilevel Secure Application Policies. [Citation Graph (0, 0)][DBLP] ESORICS, 1998, pp:33-49 [Conf]
- Christophe Bidan, Valérie Issarny
Dealing with Multi-policy Security in Large Open Distributed Systems. [Citation Graph (0, 0)][DBLP] ESORICS, 1998, pp:51-66 [Conf]
- Rodolphe Ortalo
A Flexible Method for Information System Security Policy Specification. [Citation Graph (0, 0)][DBLP] ESORICS, 1998, pp:67-84 [Conf]
- Markus Michels, Markus Stadler, Hung-Min Sun
On the Security of Some Variants of the RSA Signature Scheme. [Citation Graph (0, 0)][DBLP] ESORICS, 1998, pp:85-96 [Conf]
- John Kelsey, Bruce Schneier, David Wagner, Chris Hall
Side Channel Cryptanalysis of Product Ciphers. [Citation Graph (0, 0)][DBLP] ESORICS, 1998, pp:97-110 [Conf]
- Ross J. Anderson
On the Security of Digital Tachographs. [Citation Graph (0, 0)][DBLP] ESORICS, 1998, pp:111-125 [Conf]
- Elisa Bertino, Francesco Buccafurri, Elena Ferrari, Pasquale Rullo
An Authorization Model and Its Formal Semantics. [Citation Graph (0, 0)][DBLP] ESORICS, 1998, pp:127-142 [Conf]
- Günter Karjoth
Authorization in CORBA Security. [Citation Graph (0, 0)][DBLP] ESORICS, 1998, pp:143-158 [Conf]
- Frédéric Cuppens, Alban Gabillon
Rules for Designing Multilevel Object-Oriented Databases. [Citation Graph (0, 0)][DBLP] ESORICS, 1998, pp:159-174 [Conf]
- Joachim Posegga, Harald Vogt
Byte Code Verification for Java Smart Card Based on Model Checking. [Citation Graph (0, 0)][DBLP] ESORICS, 1998, pp:175-190 [Conf]
- Lora Kassab, Steven J. Greenwald
Towards Formalizing the Java Security Architecture of JDK 1.2. [Citation Graph (0, 0)][DBLP] ESORICS, 1998, pp:191-207 [Conf]
- Angelos Varvitsiotis, Despina Polemi, Andy Marsh
EUROMED-JAVA: Trusted Third Party Services for Securing Medical Java Applets. [Citation Graph (0, 0)][DBLP] ESORICS, 1998, pp:209-220 [Conf]
- Jean-Paul M. G. Linnartz, Joop Talstra
MPEG PTY-Marks: Cheap Detection of Embedded Copyright Data in DVD-Video. [Citation Graph (0, 0)][DBLP] ESORICS, 1998, pp:221-240 [Conf]
- Daniel Augot, Jean-François Delaigle, Caroline Fontaine
DHWM: A Scheme for Managing Watermarking Keys in the Aquarelle Multimedia Distributed System. [Citation Graph (0, 0)][DBLP] ESORICS, 1998, pp:241-255 [Conf]
- Jean-Paul M. G. Linnartz
The "Ticket" Concept for Copy Control Based on Embedded Signalling. [Citation Graph (0, 0)][DBLP] ESORICS, 1998, pp:257-274 [Conf]
- Gérard Eizenberg, Jean-Jacques Quisquater
Panel Session: Watermarking. [Citation Graph (0, 0)][DBLP] ESORICS, 1998, pp:275- [Conf]
- Günther Horn, Bart Preneel
Authentication and Payment in Future Mobile Systems. [Citation Graph (0, 0)][DBLP] ESORICS, 1998, pp:277-293 [Conf]
- Dogan Kesdogan, Peter Reichl, Klaus Junghärtchen
Distributed Temporary Pseudonyms: A New Approach for Protecting Location Information in Mobile Communication Networks. [Citation Graph (0, 0)][DBLP] ESORICS, 1998, pp:295-312 [Conf]
- Elke Franz, Anja Jerichow
A Mix-Mediated Anonymity Service and Its Payment. [Citation Graph (0, 0)][DBLP] ESORICS, 1998, pp:313-327 [Conf]
- Audun Jøsang
A Subjective Metric of Authentication. [Citation Graph (0, 0)][DBLP] ESORICS, 1998, pp:329-344 [Conf]
- Volker Kessler, Heike Neumann
A Sound Logic for Analysing Electronic Commerce Protocols. [Citation Graph (0, 0)][DBLP] ESORICS, 1998, pp:345-360 [Conf]
- Giampaolo Bella, Lawrence C. Paulson
Kerberos Version 4: Inductive Analysis of the Secrecy Goals. [Citation Graph (0, 0)][DBLP] ESORICS, 1998, pp:361-375 [Conf]
|