The SCEAS System
Navigation Menu

Conferences in DBLP

European Symposium on Research in Computer Security (ESORICS) (esorics)
2006 (conf/esorics/2006)

  1. Michael P. Collins, Michael K. Reiter
    Finding Peer-to-Peer File-Sharing Using Coarse Network Behaviors. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2006, pp:1-17 [Conf]
  2. Vitaly Shmatikov, Ming-Hsiu Wang
    Timing Analysis in Low-Latency Mix Networks: Attacks and Defenses. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2006, pp:18-33 [Conf]
  3. Milan Fort, Felix C. Freiling, Lucia Draque Penso, Zinaida Benenson, Dogan Kesdogan
    TrustedPals: Secure Multiparty Computation Implemented with Smart Cards. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2006, pp:34-48 [Conf]
  4. Shuhong Wang, Xuhua Ding, Robert H. Deng, Feng Bao
    Private Information Retrieval Using Trusted Hardware. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2006, pp:49-64 [Conf]
  5. Yuji Watanabe, Sachiko Yoshihama, Takuya Mishina, Michiharu Kudo, Hiroshi Maruyama
    Bridging the Gap Between Inter-communication Boundary and Internal Trusted Components. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2006, pp:65-80 [Conf]
  6. Cheun Ngen Chong, Sorin Iacob, Paul Koster, Javier Montaner, René van Buuren
    License Transfer in OMA-DRM. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2006, pp:81-96 [Conf]
  7. Abdellatif Benjelloun Touimi, Jean-Bernard Fischer, Caroline Fontaine, Christophe Giraud, Michel Milhau
    Enhanced Security Architecture for Music Distribution on Mobile. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2006, pp:97-109 [Conf]
  8. Frédéric Besson, Guillaume Dufay, Thomas P. Jensen
    A Formal Model of Access Control for Mobile Interactive Devices. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2006, pp:110-126 [Conf]
  9. Philip W. L. Fong
    Discretionary Capability Confinement. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2006, pp:127-144 [Conf]
  10. Xi-Bin Zhao, Kwok-Yan Lam, Guimin Luo, Siu Leung Chung, Ming Gu
    Minimal Threshold Closure. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2006, pp:145-155 [Conf]
  11. Hao Wang, Somesh Jha, Thomas W. Reps, Stefan Schwoon, Stuart G. Stubblebine
    Reducing the Dependence of SPKI/SDSI on PKI. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2006, pp:156-173 [Conf]
  12. Jason Crampton, Hemanth Khambhammettu
    Delegation in Role-Based Access Control. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2006, pp:174-191 [Conf]
  13. Daniel Mellado, Eduardo Fernández-Medina, Mario Piattini
    Applying a Security Requirements Engineering Process. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2006, pp:192-206 [Conf]
  14. Hai Wang, Peng Liu
    Modeling and Evaluating the Survivability of an Intrusion Tolerant Database System. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2006, pp:207-224 [Conf]
  15. Thomas Santen
    A Formal Framework for Confidentiality-Preserving Refinement. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2006, pp:225-242 [Conf]
  16. Boris Köpf, David A. Basin
    Timing-Sensitive Information Flow Analysis for Synchronous Systems. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2006, pp:243-262 [Conf]
  17. Jing Wang, Yoshiaki Takata, Hiroyuki Seki
    HBAC: A Model for History-Based Access Control and Its Model Checking. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2006, pp:263-278 [Conf]
  18. David A. Naumann
    From Coupling Relations to Mated Invariants for Checking Information Flow. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2006, pp:279-296 [Conf]
  19. Deepak Garg, Lujo Bauer, Kevin D. Bowers, Frank Pfenning, Michael K. Reiter
    A Linear Logic of Authorization and Knowledge. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2006, pp:297-312 [Conf]
  20. Peter Y. A. Ryan, Steve A. Schneider
    Prêt à Voter with Re-encryption Mixes. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2006, pp:313-326 [Conf]
  21. Michael Backes, Christian Cachin, Alina Oprea
    Secure Key-Updating for Lazy Revocation. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2006, pp:327-346 [Conf]
  22. Mudhakar Srivatsa, Ling Liu
    Key Derivation Algorithms for Monotone Access Structures in Cryptographic File Systems. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2006, pp:347-361 [Conf]
  23. Michael Backes, Iliano Cervesato, Aaron D. Jaggard, Andre Scedrov, Joe-Kai Tsay
    Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2006, pp:362-383 [Conf]
  24. Dusko Pavlovic, Catherine Meadows
    Deriving Secrecy in Key Establishment Protocols. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2006, pp:384-403 [Conf]
  25. Michael Backes, Birgit Pfitzmann, Michael Waidner
    Limits of the BRSIM/UC Soundness of Dolev-Yao Models with Hashes. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2006, pp:404-423 [Conf]
  26. Michael Backes, Markus Dürmuth, Dennis Hofheinz, Ralf Küsters
    Conditional Reactive Simulatability. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2006, pp:424-443 [Conf]
  27. Martin Johns
    SessionSafe: Implementing XSS Immune Session Handling. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2006, pp:444-460 [Conf]
  28. Ted Huffmire, Shreyas Prasad, Timothy Sherwood, Ryan Kastner
    Policy-Driven Memory Protection for Reconfigurable Hardware. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2006, pp:461-478 [Conf]
  29. Zhiqiang Yang, Sheng Zhong, Rebecca N. Wright
    Privacy-Preserving Queries on Encrypted Data. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2006, pp:479-495 [Conf]
  30. Joaquín García-Alfaro, Frédéric Cuppens, Nora Cuppens-Boulahia
    Analysis of Policy Anomalies on Distributed Network Security Setups. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2006, pp:496-511 [Conf]
  31. Gabriel Maciá-Fernández, Jesús E. Díaz-Verdejo, Pedro Garcia-Teodoro
    Assessment of a Vulnerability in Iterative Servers Enabling Low-Rate DoS Attacks. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2006, pp:512-526 [Conf]
  32. Guofei Gu, Prahlad Fogla, David Dagon, Wenke Lee, Boris Skoric
    Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2006, pp:527-546 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002