The SCEAS System
Navigation Menu

Conferences in DBLP

European Symposium on Research in Computer Security (ESORICS) (esorics)
1998 (conf/esorics/1998)

  1. Hervé Debar, Marc Dacier, Mehdi Nassehi, Andreas Wespi
    Fixed vs. Variable-Length Patterns for Detecting Suspicious Process Behavior. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1998, pp:1-15 [Conf]
  2. Danilo Bruschi, Emilia Rosti, R. Banfi
    A Tool for Pro-active Defense Against the Buffer Overrun Attack. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1998, pp:17-31 [Conf]
  3. Simon N. Foley
    A Kernelized Architecture for Multilevel Secure Application Policies. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1998, pp:33-49 [Conf]
  4. Christophe Bidan, Valérie Issarny
    Dealing with Multi-policy Security in Large Open Distributed Systems. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1998, pp:51-66 [Conf]
  5. Rodolphe Ortalo
    A Flexible Method for Information System Security Policy Specification. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1998, pp:67-84 [Conf]
  6. Markus Michels, Markus Stadler, Hung-Min Sun
    On the Security of Some Variants of the RSA Signature Scheme. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1998, pp:85-96 [Conf]
  7. John Kelsey, Bruce Schneier, David Wagner, Chris Hall
    Side Channel Cryptanalysis of Product Ciphers. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1998, pp:97-110 [Conf]
  8. Ross J. Anderson
    On the Security of Digital Tachographs. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1998, pp:111-125 [Conf]
  9. Elisa Bertino, Francesco Buccafurri, Elena Ferrari, Pasquale Rullo
    An Authorization Model and Its Formal Semantics. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1998, pp:127-142 [Conf]
  10. Günter Karjoth
    Authorization in CORBA Security. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1998, pp:143-158 [Conf]
  11. Frédéric Cuppens, Alban Gabillon
    Rules for Designing Multilevel Object-Oriented Databases. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1998, pp:159-174 [Conf]
  12. Joachim Posegga, Harald Vogt
    Byte Code Verification for Java Smart Card Based on Model Checking. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1998, pp:175-190 [Conf]
  13. Lora Kassab, Steven J. Greenwald
    Towards Formalizing the Java Security Architecture of JDK 1.2. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1998, pp:191-207 [Conf]
  14. Angelos Varvitsiotis, Despina Polemi, Andy Marsh
    EUROMED-JAVA: Trusted Third Party Services for Securing Medical Java Applets. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1998, pp:209-220 [Conf]
  15. Jean-Paul M. G. Linnartz, Joop Talstra
    MPEG PTY-Marks: Cheap Detection of Embedded Copyright Data in DVD-Video. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1998, pp:221-240 [Conf]
  16. Daniel Augot, Jean-François Delaigle, Caroline Fontaine
    DHWM: A Scheme for Managing Watermarking Keys in the Aquarelle Multimedia Distributed System. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1998, pp:241-255 [Conf]
  17. Jean-Paul M. G. Linnartz
    The "Ticket" Concept for Copy Control Based on Embedded Signalling. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1998, pp:257-274 [Conf]
  18. Gérard Eizenberg, Jean-Jacques Quisquater
    Panel Session: Watermarking. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1998, pp:275- [Conf]
  19. Günther Horn, Bart Preneel
    Authentication and Payment in Future Mobile Systems. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1998, pp:277-293 [Conf]
  20. Dogan Kesdogan, Peter Reichl, Klaus Junghärtchen
    Distributed Temporary Pseudonyms: A New Approach for Protecting Location Information in Mobile Communication Networks. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1998, pp:295-312 [Conf]
  21. Elke Franz, Anja Jerichow
    A Mix-Mediated Anonymity Service and Its Payment. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1998, pp:313-327 [Conf]
  22. Audun Jøsang
    A Subjective Metric of Authentication. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1998, pp:329-344 [Conf]
  23. Volker Kessler, Heike Neumann
    A Sound Logic for Analysing Electronic Commerce Protocols. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1998, pp:345-360 [Conf]
  24. Giampaolo Bella, Lawrence C. Paulson
    Kerberos Version 4: Inductive Analysis of the Secrecy Goals. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1998, pp:361-375 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002