The SCEAS System
Navigation Menu

Conferences in DBLP

European Symposium on Research in Computer Security (ESORICS) (esorics)
1996 (conf/esorics/1996)

  1. Michael Waidner
    Development of a Secure Electronic Marketplace for Europe. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1996, pp:1-14 [Conf]
  2. Wenbo Mao
    Light-Weight Micro-cash Payment for the Internet. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1996, pp:15-32 [Conf]
  3. Jan Camenisch, Ueli M. Maurer, Markus Stadler
    Digital Payment Systems with Passive Anonymity-Revoking Trustees. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1996, pp:33-43 [Conf]
  4. Vijayalakshmi Atluri, Wei-kuang Huang
    An Authorization Model for Workflows. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1996, pp:44-64 [Conf]
  5. Ravi S. Sandhu
    Role Hierarchies and Constraints for Lattice-Based Access Controls. [Citation Graph (1, 0)][DBLP]
    ESORICS, 1996, pp:65-79 [Conf]
  6. Vincent Nicomette, Yves Deswarte
    A Multilevel Security Model for Distributed Object Systems. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1996, pp:80-98 [Conf]
  7. Sabrina De Capitani di Vimercati, Pierangela Samarati
    An Authorization Model for Federated Systems. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1996, pp:99-117 [Conf]
  8. William M. Farmer, Joshua D. Guttman, Vipin Swarup
    Security for Mobile Agents: Authentication and State Appraisal. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1996, pp:118-130 [Conf]
  9. N. Asokan, Gene Tsudik, Michael Waidner
    Server-Supported Signatures. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1996, pp:131-143 [Conf]
  10. Stefano Zatti, Refik Molva, Angelo Tosi, Gene Tsudik, Helmut Kurth
    Limitations of the Approach of Solving a Network's Security Problem with a Firewall. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1996, pp:144-145 [Conf]
  11. Shyhtsun Felix Wu
    Sleepy Network-Layer Authentication Service for IPSEC. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1996, pp:146-159 [Conf]
  12. Jianying Zhou, Dieter Gollmann
    Certified Electronic Mail. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1996, pp:160-171 [Conf]
  13. Bruce Schneier, John Kelsey, Jay Walker
    Distributed Proctoring. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1996, pp:172-182 [Conf]
  14. Piero A. Bonatti, Maria Luisa Sapino, V. S. Subrahmanian
    Merging Heterogeneous Security Orderings. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1996, pp:183-197 [Conf]
  15. Steve Schneider, Abraham Sidiropoulos
    CSP and Anonymity. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1996, pp:198-218 [Conf]
  16. Gabriele Wedel, Volker Kessler
    Formal Semantics for Authentication Logics. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1996, pp:219-241 [Conf]
  17. Volkmar Lotz
    Threat Scenarios as a Means to Formally Develop Secure Systems. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1996, pp:242-265 [Conf]
  18. Andrew Warner, Qiang Li, Thomas F. Keefe, Shankar Pal
    The Impact of Multilevel Security on Database Buffer Management. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1996, pp:266-289 [Conf]
  19. Donald G. Marks, Amihai Motro, Sushil Jajodia
    Enhancing the Controlled Disclosure of Sensitive Information. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1996, pp:290-303 [Conf]
  20. Luigi V. Mancini, Indrajit Ray
    Secure Concurrency Control in MLS Databases with Two Versions of Data. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1996, pp:304-323 [Conf]
  21. Gérard Eizenberg, Dominique Gonthier, Alistair Kelman, Jean-Jacques Quisquater
    Authors' Rights and Copyright Protection. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1996, pp:324- [Conf]
  22. Ueli M. Maurer
    Modelling a Public-Key Infrastructure. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1996, pp:325-350 [Conf]
  23. Catherine Meadows
    Analyzing the Needham-Schroeder Public-Key Protocol: A Comparison of Two Approaches. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1996, pp:351-364 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002