Conferences in DBLP
(etrics) 2006 (conf/etrics/2006)
Andreas Pfitzmann Multilateral Security: Enabling Technologies and Their Evaluation. [Citation Graph (0, 0)][DBLP ] ETRICS, 2006, pp:1-13 [Conf ] Shyong K. Lam , Dan Frankowski , John Riedl Do You Trust Your Recommendations? An Exploration of Security and Privacy Issues in Recommender Systems. [Citation Graph (0, 0)][DBLP ] ETRICS, 2006, pp:14-29 [Conf ] Martin Wimmer , Martina-Cezara Albutiu , Alfons Kemper Optimized Workflow Authorization in Service Oriented Architectures. [Citation Graph (0, 0)][DBLP ] ETRICS, 2006, pp:30-44 [Conf ] Francesco Palmieri Dynamic Layer-2 VPN Services for Improving Security in the Grid Environment. [Citation Graph (0, 0)][DBLP ] ETRICS, 2006, pp:45-59 [Conf ] Esther Palomar , Juan M. Estévez-Tapiador , Julio César Hernández Castro , Arturo Ribagorda A P2P Content Authentication Protocol Based on Byzantine Agreement. [Citation Graph (0, 0)][DBLP ] ETRICS, 2006, pp:60-72 [Conf ] Nicolai Kuntze , Andreas U. Schmidt Transitive Trust in Mobile Scenarios. [Citation Graph (0, 0)][DBLP ] ETRICS, 2006, pp:73-85 [Conf ] Marko Hassinen , Konstantin Hyppönen , Keijo Haataja An Open, PKI-Based Mobile Payment System. [Citation Graph (0, 0)][DBLP ] ETRICS, 2006, pp:86-100 [Conf ] Young-Sik Hwang , Seung Wan Han , Taek Yong Nam Secure Rejoining Scheme for Dynamic Sensor Networks. [Citation Graph (0, 0)][DBLP ] ETRICS, 2006, pp:101-114 [Conf ] Holger Grandy , Dominik Haneberg , Wolfgang Reif , Kurt Stenzel Developing Provable Secure M-Commerce Applications. [Citation Graph (0, 0)][DBLP ] ETRICS, 2006, pp:115-129 [Conf ] Dominik Raub , Rainer Steinwandt An Algebra for Enterprise Privacy Policies Closed Under Composition and Conjunction. [Citation Graph (0, 0)][DBLP ] ETRICS, 2006, pp:130-144 [Conf ] Jim Dowd , Shouhuai Xu , Weining Zhang Privacy-Preserving Decision Tree Mining Based on Random Substitutions. [Citation Graph (0, 0)][DBLP ] ETRICS, 2006, pp:145-159 [Conf ] Wolfgang Hommel Policy-Based Integration of User and Provider-Sided Identity Management. [Citation Graph (0, 0)][DBLP ] ETRICS, 2006, pp:160-174 [Conf ] Sven Wohlgemuth , Günter Müller Privacy with Delegation of Rights by Identity Management. [Citation Graph (0, 0)][DBLP ] ETRICS, 2006, pp:175-190 [Conf ] Sebastian Clauß A Framework for Quantification of Linkability Within a Privacy-Enhancing Identity Management System. [Citation Graph (0, 0)][DBLP ] ETRICS, 2006, pp:191-205 [Conf ] Stefan Köpsell , Rolf Wendolsky , Hannes Federrath Revocable Anonymity. [Citation Graph (0, 0)][DBLP ] ETRICS, 2006, pp:206-220 [Conf ] Stefan Köpsell Low Latency Anonymous Communication - How Long Are Users Willing to Wait?. [Citation Graph (0, 0)][DBLP ] ETRICS, 2006, pp:221-237 [Conf ] Denis Hatebur , Maritta Heisel , Holger Schmidt Security Engineering Using Problem Frames. [Citation Graph (0, 0)][DBLP ] ETRICS, 2006, pp:238-253 [Conf ] Steffen Kolarczyk , Manuel Koch , Klaus-Peter Löhr , Karl Pauls SecTOOL - Supporting Requirements Engineering for Access Control. [Citation Graph (0, 0)][DBLP ] ETRICS, 2006, pp:254-267 [Conf ] Dieter Hutter Possibilistic Information Flow Control in MAKS and Action Refinement. [Citation Graph (0, 0)][DBLP ] ETRICS, 2006, pp:268-281 [Conf ] Ihab Hamadeh , George Kesidis Toward a Framework for Forensic Analysis of Scanning Worms. [Citation Graph (0, 0)][DBLP ] ETRICS, 2006, pp:282-297 [Conf ] Rainer Böhme A Comparison of Market Approaches to Software Vulnerability Disclosure. [Citation Graph (0, 0)][DBLP ] ETRICS, 2006, pp:298-311 [Conf ] Woojin Chang Reliable Keystroke Biometric System Based on a Small Number of Keystroke Samples. [Citation Graph (0, 0)][DBLP ] ETRICS, 2006, pp:312-320 [Conf ] Michael Barnett , David A. Naumann , Wolfram Schulte , Qi Sun Allowing State Changes in Specifications. [Citation Graph (0, 0)][DBLP ] ETRICS, 2006, pp:321-336 [Conf ] Kathrin Lehmann , Peter Thiemann Field Access Analysis for Enforcing Access Control Policies. [Citation Graph (0, 0)][DBLP ] ETRICS, 2006, pp:337-351 [Conf ] Paul E. Sevinç , David A. Basin , Ernst-Rüdiger Olderog Controlling Access to Documents: A Formal Access Control Model. [Citation Graph (0, 0)][DBLP ] ETRICS, 2006, pp:352-367 [Conf ] Jürgen Nützel , Anja Beyer How to Increase the Security of Digital Rights Management Systems Without Affecting Consumer's Security. [Citation Graph (0, 0)][DBLP ] ETRICS, 2006, pp:368-380 [Conf ] Carsten Hohendorf , Erwin P. Rathgeb , Esbold Unurkhaan , Michael Tüxen Secure End-to-End Transport over SCTP. [Citation Graph (0, 0)][DBLP ] ETRICS, 2006, pp:381-395 [Conf ] Almudena Alcaide , Juan M. Estévez-Tapiador , Julio César Hernández Castro , Arturo Ribagorda An Extended Model of Rational Exchange Based on Dynamic Games of Imperfect Information. [Citation Graph (0, 0)][DBLP ] ETRICS, 2006, pp:396-408 [Conf ] Florian Kerschbaum , Orestis Terzidis Filtering for Private Collaborative Benchmarking. [Citation Graph (0, 0)][DBLP ] ETRICS, 2006, pp:409-422 [Conf ] Fernando Godínez , Dieter Hutter , Raul Monroy On the Use of Word Networks to Mimicry Attack Detection. [Citation Graph (0, 0)][DBLP ] ETRICS, 2006, pp:423-435 [Conf ] Sebastian Schmerl , Hartmut König , Ulrich Flegel , Michael Meier Simplifying Signature Engineering by Reuse. [Citation Graph (0, 0)][DBLP ] ETRICS, 2006, pp:436-450 [Conf ] Jun Qian , Chao Xu , Meilin Shi Redesign and Implementation of Evaluation Dataset for Intrusion Detection System. [Citation Graph (0, 0)][DBLP ] ETRICS, 2006, pp:451-465 [Conf ] Ulrich Flegel , Joachim Biskup Requirements of Information Reductions for Cooperating Intrusion Detection Agents. [Citation Graph (0, 0)][DBLP ] ETRICS, 2006, pp:466-480 [Conf ] Arthur Schmidt Quantum Algorithm for Solving the Discrete Logarithm Problem in the Class Group of an Imaginary Quadratic Field and Security Comparison of Current Cryptosystems at the Beginning of Quantum Computer Age. [Citation Graph (0, 0)][DBLP ] ETRICS, 2006, pp:481-493 [Conf ] Marcin Gogolewski , Marek Klonowski , Przemyslaw Kubiak , Miroslaw Kutylowski , Anna Lauks , Filip Zagórski Kleptographic Attacks on E-Voting Schemes. [Citation Graph (0, 0)][DBLP ] ETRICS, 2006, pp:494-508 [Conf ] Igor Fischer , Thorsten Herfet Visual Document Authentication Using Human-Recognizable Watermarks. [Citation Graph (0, 0)][DBLP ] ETRICS, 2006, pp:509-521 [Conf ]