Conferences in DBLP
Michael P. Collins , Michael K. Reiter Finding Peer-to-Peer File-Sharing Using Coarse Network Behaviors. [Citation Graph (0, 0)][DBLP ] ESORICS, 2006, pp:1-17 [Conf ] Vitaly Shmatikov , Ming-Hsiu Wang Timing Analysis in Low-Latency Mix Networks: Attacks and Defenses. [Citation Graph (0, 0)][DBLP ] ESORICS, 2006, pp:18-33 [Conf ] Milan Fort , Felix C. Freiling , Lucia Draque Penso , Zinaida Benenson , Dogan Kesdogan TrustedPals: Secure Multiparty Computation Implemented with Smart Cards. [Citation Graph (0, 0)][DBLP ] ESORICS, 2006, pp:34-48 [Conf ] Shuhong Wang , Xuhua Ding , Robert H. Deng , Feng Bao Private Information Retrieval Using Trusted Hardware. [Citation Graph (0, 0)][DBLP ] ESORICS, 2006, pp:49-64 [Conf ] Yuji Watanabe , Sachiko Yoshihama , Takuya Mishina , Michiharu Kudo , Hiroshi Maruyama Bridging the Gap Between Inter-communication Boundary and Internal Trusted Components. [Citation Graph (0, 0)][DBLP ] ESORICS, 2006, pp:65-80 [Conf ] Cheun Ngen Chong , Sorin Iacob , Paul Koster , Javier Montaner , René van Buuren License Transfer in OMA-DRM. [Citation Graph (0, 0)][DBLP ] ESORICS, 2006, pp:81-96 [Conf ] Abdellatif Benjelloun Touimi , Jean-Bernard Fischer , Caroline Fontaine , Christophe Giraud , Michel Milhau Enhanced Security Architecture for Music Distribution on Mobile. [Citation Graph (0, 0)][DBLP ] ESORICS, 2006, pp:97-109 [Conf ] Frédéric Besson , Guillaume Dufay , Thomas P. Jensen A Formal Model of Access Control for Mobile Interactive Devices. [Citation Graph (0, 0)][DBLP ] ESORICS, 2006, pp:110-126 [Conf ] Philip W. L. Fong Discretionary Capability Confinement. [Citation Graph (0, 0)][DBLP ] ESORICS, 2006, pp:127-144 [Conf ] Xi-Bin Zhao , Kwok-Yan Lam , Guimin Luo , Siu Leung Chung , Ming Gu Minimal Threshold Closure. [Citation Graph (0, 0)][DBLP ] ESORICS, 2006, pp:145-155 [Conf ] Hao Wang , Somesh Jha , Thomas W. Reps , Stefan Schwoon , Stuart G. Stubblebine Reducing the Dependence of SPKI/SDSI on PKI. [Citation Graph (0, 0)][DBLP ] ESORICS, 2006, pp:156-173 [Conf ] Jason Crampton , Hemanth Khambhammettu Delegation in Role-Based Access Control. [Citation Graph (0, 0)][DBLP ] ESORICS, 2006, pp:174-191 [Conf ] Daniel Mellado , Eduardo Fernández-Medina , Mario Piattini Applying a Security Requirements Engineering Process. [Citation Graph (0, 0)][DBLP ] ESORICS, 2006, pp:192-206 [Conf ] Hai Wang , Peng Liu Modeling and Evaluating the Survivability of an Intrusion Tolerant Database System. [Citation Graph (0, 0)][DBLP ] ESORICS, 2006, pp:207-224 [Conf ] Thomas Santen A Formal Framework for Confidentiality-Preserving Refinement. [Citation Graph (0, 0)][DBLP ] ESORICS, 2006, pp:225-242 [Conf ] Boris Köpf , David A. Basin Timing-Sensitive Information Flow Analysis for Synchronous Systems. [Citation Graph (0, 0)][DBLP ] ESORICS, 2006, pp:243-262 [Conf ] Jing Wang , Yoshiaki Takata , Hiroyuki Seki HBAC: A Model for History-Based Access Control and Its Model Checking. [Citation Graph (0, 0)][DBLP ] ESORICS, 2006, pp:263-278 [Conf ] David A. Naumann From Coupling Relations to Mated Invariants for Checking Information Flow. [Citation Graph (0, 0)][DBLP ] ESORICS, 2006, pp:279-296 [Conf ] Deepak Garg , Lujo Bauer , Kevin D. Bowers , Frank Pfenning , Michael K. Reiter A Linear Logic of Authorization and Knowledge. [Citation Graph (0, 0)][DBLP ] ESORICS, 2006, pp:297-312 [Conf ] Peter Y. A. Ryan , Steve A. Schneider Prêt à Voter with Re-encryption Mixes. [Citation Graph (0, 0)][DBLP ] ESORICS, 2006, pp:313-326 [Conf ] Michael Backes , Christian Cachin , Alina Oprea Secure Key-Updating for Lazy Revocation. [Citation Graph (0, 0)][DBLP ] ESORICS, 2006, pp:327-346 [Conf ] Mudhakar Srivatsa , Ling Liu Key Derivation Algorithms for Monotone Access Structures in Cryptographic File Systems. [Citation Graph (0, 0)][DBLP ] ESORICS, 2006, pp:347-361 [Conf ] Michael Backes , Iliano Cervesato , Aaron D. Jaggard , Andre Scedrov , Joe-Kai Tsay Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos. [Citation Graph (0, 0)][DBLP ] ESORICS, 2006, pp:362-383 [Conf ] Dusko Pavlovic , Catherine Meadows Deriving Secrecy in Key Establishment Protocols. [Citation Graph (0, 0)][DBLP ] ESORICS, 2006, pp:384-403 [Conf ] Michael Backes , Birgit Pfitzmann , Michael Waidner Limits of the BRSIM/UC Soundness of Dolev-Yao Models with Hashes. [Citation Graph (0, 0)][DBLP ] ESORICS, 2006, pp:404-423 [Conf ] Michael Backes , Markus Dürmuth , Dennis Hofheinz , Ralf Küsters Conditional Reactive Simulatability. [Citation Graph (0, 0)][DBLP ] ESORICS, 2006, pp:424-443 [Conf ] Martin Johns SessionSafe: Implementing XSS Immune Session Handling. [Citation Graph (0, 0)][DBLP ] ESORICS, 2006, pp:444-460 [Conf ] Ted Huffmire , Shreyas Prasad , Timothy Sherwood , Ryan Kastner Policy-Driven Memory Protection for Reconfigurable Hardware. [Citation Graph (0, 0)][DBLP ] ESORICS, 2006, pp:461-478 [Conf ] Zhiqiang Yang , Sheng Zhong , Rebecca N. Wright Privacy-Preserving Queries on Encrypted Data. [Citation Graph (0, 0)][DBLP ] ESORICS, 2006, pp:479-495 [Conf ] Joaquín García-Alfaro , Frédéric Cuppens , Nora Cuppens-Boulahia Analysis of Policy Anomalies on Distributed Network Security Setups. [Citation Graph (0, 0)][DBLP ] ESORICS, 2006, pp:496-511 [Conf ] Gabriel Maciá-Fernández , Jesús E. Díaz-Verdejo , Pedro Garcia-Teodoro Assessment of a Vulnerability in Iterative Servers Enabling Low-Rate DoS Attacks. [Citation Graph (0, 0)][DBLP ] ESORICS, 2006, pp:512-526 [Conf ] Guofei Gu , Prahlad Fogla , David Dagon , Wenke Lee , Boris Skoric Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP ] ESORICS, 2006, pp:527-546 [Conf ]