The SCEAS System
Navigation Menu

Conferences in DBLP

European Symposium on Research in Computer Security (ESORICS) (esorics)
2002 (conf/esorics/2002)

  1. Michael Backes, Birgit Pfitzmann
    Computational Probabilistic Non-interference. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2002, pp:1-23 [Conf]
  2. Kaoru Kurosawa, Wakaha Ogata
    Bit-Slice Auction Circuit. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2002, pp:24-38 [Conf]
  3. Joachim Biskup, Piero A. Bonatti
    Confidentiality Policies and Their Enforcement for Controlled Query Evaluation. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2002, pp:39-54 [Conf]
  4. Lingyu Wang, Duminda Wijesekera, Sushil Jajodia
    Cardinality-Based Inference Control in Sum-Only Data Cubes. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2002, pp:55-71 [Conf]
  5. Sean W. Smith
    Outbound Authentication for Programmable Secure Coprocessors. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2002, pp:72-89 [Conf]
  6. Marcin Gomulkiewicz, Miroslaw Kutylowski
    Hamming Weight Attacks on Cryptographic Hardware - Breaking Masking Defense. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2002, pp:90-103 [Conf]
  7. Giles Hogben, Tom Jackson, Marc Wilikens
    A Fully Compliant Research Implementation of the P3P Standard for Privacy Protection: Experiences and Recommendations. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2002, pp:104-125 [Conf]
  8. James Giles, Reiner Sailer, Dinesh C. Verma, Suresh Chari
    Authentication for Distributed Web Caches. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2002, pp:126-145 [Conf]
  9. Philippa J. Broadfoot, Gavin Lowe
    Analysing a Stream Authentication Protocol Using Model Checking. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2002, pp:146-161 [Conf]
  10. James Heather, Steve Schneider
    Equal To The Task? [Citation Graph (0, 0)][DBLP]
    ESORICS, 2002, pp:162-177 [Conf]
  11. Aloysius K. Mok, Weijiang Yu
    TINMAN: A Resource Bound Security Checking System for Mobile Code. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2002, pp:178-193 [Conf]
  12. Thomas Santen, Maritta Heisel, Andreas Pfitzmann
    Confidentiality-Preserving Refinement is Compositional - Sometimes. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2002, pp:194-211 [Conf]
  13. David von Oheimb, Volkmar Lotz
    Formal Security Analysis with Interacting State Machines. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2002, pp:212-228 [Conf]
  14. Manuel Koch, Luigi V. Mancini, Francesco Parisi-Presicce
    Decidability of Safety in Graph-Based Models for Access Control. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2002, pp:229-243 [Conf]
  15. Xinyuan Wang, Douglas S. Reeves, Shyhtsun Felix Wu
    Inter-Packet Delay Based Correlation for Tracing Encrypted Connections through Stepping Stones. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2002, pp:244-263 [Conf]
  16. Sin Yeung Lee, Wai Lup Low, Pei Yuen Wong
    Learning Fingerprints for a Database Intrusion Detection System. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2002, pp:264-280 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002