|
Conferences in DBLP
- Elisa Bertino, Elena Ferrari, Loredana Parasiliti Provenza
Signature and Access Control Policies for XML Documents. [Citation Graph (0, 0)][DBLP] ESORICS, 2003, pp:1-22 [Conf]
- Dulce Domingos, António Rito Silva, Pedro Veiga
Authorization and Access Control in Adaptive Workflows. [Citation Graph (0, 0)][DBLP] ESORICS, 2003, pp:23-38 [Conf]
- Xuhui Ao, Naftaly H. Minsky
Flexible Regulation of Distributed Coalitions. [Citation Graph (0, 0)][DBLP] ESORICS, 2003, pp:39-60 [Conf]
- Dennis Hofheinz, Jörn Müller-Quade, Rainer Steinwandt
Initiator-Resilient Universally Composable Key Exchange. [Citation Graph (0, 0)][DBLP] ESORICS, 2003, pp:61-84 [Conf]
- Yuji Watanabe, Masayuki Numao
Multi-round Secure-Light Broadcast Exclusion Protocol with Pre-processing. [Citation Graph (0, 0)][DBLP] ESORICS, 2003, pp:85-99 [Conf]
- Lingyu Wang, Yingjiu Li, Duminda Wijesekera, Sushil Jajodia
Precisely Answering Multi-dimensional Range Queries without Privacy Breaches. [Citation Graph (0, 0)][DBLP] ESORICS, 2003, pp:100-115 [Conf]
- Andrei Serjantov, Peter Sewell
Passive Attack Analysis for Connection-Based Anonymity Systems. [Citation Graph (0, 0)][DBLP] ESORICS, 2003, pp:116-131 [Conf]
- Marcin Gomulkiewicz, Marek Klonowski, Miroslaw Kutylowski
Rapid Mixing and Security of Chaum's Visual Electronic Voting. [Citation Graph (0, 0)][DBLP] ESORICS, 2003, pp:132-145 [Conf]
- Marco Casassa Mont, Siani Pearson, Pete Bramhall
Towards Accountable Management of Privacy and Identity Information. [Citation Graph (0, 0)][DBLP] ESORICS, 2003, pp:146-161 [Conf]
- Michael Backes, Birgit Pfitzmann, Matthias Schunter
A Toolkit for Managing Enterprise Privacy Policies. [Citation Graph (0, 0)][DBLP] ESORICS, 2003, pp:162-180 [Conf]
- Helmut Scherzer, Ran Canetti, Paul A. Karger, Hugo Krawczyk, Tal Rabin, David C. Toll
Authenticating Mandatory Access Controls and Preserving Privacy for a High-Assurance Smart Card. [Citation Graph (0, 0)][DBLP] ESORICS, 2003, pp:181-200 [Conf]
- Adrian Baldwin, Simon Shiu
Hardware Encapsulation of Security Services. [Citation Graph (0, 0)][DBLP] ESORICS, 2003, pp:201-216 [Conf]
- David von Oheimb, Georg Walter, Volkmar Lotz
A Formal Security Model of the Infineon SLE 88 Smart Card Memory Managment. [Citation Graph (0, 0)][DBLP] ESORICS, 2003, pp:217-234 [Conf]
- Rogardt Heldal, Fredrik Hultin
Bridging Model-Based and Language-Based Security. [Citation Graph (0, 0)][DBLP] ESORICS, 2003, pp:235-252 [Conf]
- David A. Basin, Sebastian Mödersheim, Luca Viganò
An On-the-Fly Model-Checker for Security Protocol Analysis. [Citation Graph (0, 0)][DBLP] ESORICS, 2003, pp:253-270 [Conf]
- Michael Backes, Birgit Pfitzmann, Michael Waidner
Symmetric Authentication within a Simulatable Cryptographic Library. [Citation Graph (0, 0)][DBLP] ESORICS, 2003, pp:271-290 [Conf]
- Jacob Zimmermann, Ludovic Mé, Christophe Bidan
An Improved Reference Flow Control Model for Policy-Based Intrusion Detection. [Citation Graph (0, 0)][DBLP] ESORICS, 2003, pp:291-308 [Conf]
- Stefan Axelsson
Visualisation for Intrusion Detection. [Citation Graph (0, 0)][DBLP] ESORICS, 2003, pp:309-325 [Conf]
- Christopher Krügel, Darren Mutz, Fredrik Valeur, Giovanni Vigna
On the Detection of Anomalous System Call Arguments. [Citation Graph (0, 0)][DBLP] ESORICS, 2003, pp:326-343 [Conf]
|