The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ESORICS"( http://dblp.L3S.de/Venues/ESORICS )

URL (DBLP): http://dblp.uni-trier.de/db/conf/esorics

Publication years (Num. hits)
1990 (25) 1992 (25) 1994 (27) 1996 (24) 1998 (25) 2000 (20) 2002 (17) 2003 (20) 2004 (28) 2005 (29) 2006 (33) 2007 (41) 2008 (38) 2009 (43) 2010 (43) 2011 (37) 2012 (51) 2013 (44)
Publication types (Num. hits)
inproceedings(552) proceedings(18)
Venues (Conferences, Journals, ...)
ESORICS(570)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 311 occurrences of 214 keywords

Results
Found 570 publication records. Showing 570 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Giovanni Di Crescenzo, Shaoquan Jiang, Reihaneh Safavi-Naini Corruption-Localizing Hashing. Search on Bibsonomy ESORICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Ahren Studer, Adrian Perrig The Coremelt Attack. Search on Bibsonomy ESORICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Valentina Ciriani, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati Keep a Few: Outsourcing Data While Maintaining Confidentiality. Search on Bibsonomy ESORICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Ching Yu Ng, Willy Susilo, Yi Mu 0001, Reihaneh Safavi-Naini New Privacy Results on Synchronized RFID Authentication Protocols against Tag Tracing. Search on Bibsonomy ESORICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Yali Liu, Dipak Ghosal, Frederik Armknecht, Ahmad-Reza Sadeghi, Steffen Schulz 0001, Stefan Katzenbeisser 0001 Hide and Seek in Time - Robust Covert Timing Channels. Search on Bibsonomy ESORICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Peter Wurzinger, Leyla Bilge, Thorsten Holz, Jan Goebel, Christopher Kruegel, Engin Kirda Automatically Generating Models for Botnet Detection. Search on Bibsonomy ESORICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Qian Wang 0002, Cong Wang 0001, Jin Li 0002, Kui Ren 0001, Wenjing Lou Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing. Search on Bibsonomy ESORICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Alina Oprea, Kevin D. Bowers Authentic Time-Stamps for Archival Storage. Search on Bibsonomy ESORICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF authenticated data structures, time-stamping, regulatory compliance, archival storage
1Liang Chen, Jason Crampton Set Covering Problems in Role-Based Access Control. Search on Bibsonomy ESORICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Tiancheng Li, Xiaonan Ma, Ninghui Li WORM-SEAL: Trustworthy Data Retention and Verification for Regulatory Compliance. Search on Bibsonomy ESORICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Nils Ole Tippenhauer, Srdjan Capkun ID-Based Secure Distance Bounding and Localization. Search on Bibsonomy ESORICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Yossi Gilad, Amir Herzberg Lightweight Opportunistic Tunneling (LOT). Search on Bibsonomy ESORICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Michael LeMay, Carl A. Gunter Cumulative Attestation Kernels for Embedded Systems. Search on Bibsonomy ESORICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Ton van Deursen, Sjouke Mauw, Sasa Radomirovic, Pim Vullers Secure Ownership and Ownership Transfer in RFID Systems. Search on Bibsonomy ESORICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF RFID protocols, desynchronization resistance, formal verification, ownership, ownership transfer
1David A. Basin, Samuel J. Burri, Günter Karjoth Dynamic Enforcement of Abstract Separation of Duty Constraints. Search on Bibsonomy ESORICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Yanlin Peng, Linfeng Zhang, J. Morris Chang, Yong Guan An Effective Method for Combating Malicious Scripts Clickbots. Search on Bibsonomy ESORICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Online Advertising Networks, Network Forensics, Attack Detection, Click Fraud
1Ravinder Shankesi, Musab AlTurki, Ralf Sasse, Carl A. Gunter, José Meseguer 0001 Model-Checking DoS Amplification for VoIP Session Initiation. Search on Bibsonomy ESORICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Qihua Wang, Hongxia Jin, Ninghui Li Usable Access Control in Collaborative Environments: Authorization Based on People-Tagging. Search on Bibsonomy ESORICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Hong Chen, Xiaonan Ma, Windsor W. Hsu, Ninghui Li, Qihua Wang Access Control Friendly Query Verification for Outsourced Data Publishing. Search on Bibsonomy ESORICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Sergio Maffeis, Martín Abadi, Cédric Fournet, Andrew D. Gordon 0001 Code-Carrying Authorization. Search on Bibsonomy ESORICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Dan Bogdanov, Sven Laur, Jan Willemson Sharemind: A Framework for Fast Privacy-Preserving Computations. Search on Bibsonomy ESORICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Aslan Askarov, Sebastian Hunt, Andrei Sabelfeld, David Sands 0001 Termination-Insensitive Noninterference Leaks More Than Just a Bit. Search on Bibsonomy ESORICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Juan Pedro Muñoz-Gea, Josemaria Malgosa-Sanahuja, Pilar Manzanares-Lopez, Juan Carlos Sánchez-Aarnoutse, Joan García-Haro A Low-Variance Random-Walk Procedure to Provide Anonymity in Overlay Networks. Search on Bibsonomy ESORICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Flavio D. Garcia, Gerhard de Koning Gans, Ruben Muijrers, Peter van Rossum, Roel Verdult, Ronny Wichers Schreur, Bart Jacobs 0001 Dismantling MIFARE Classic. Search on Bibsonomy ESORICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1David Lundin, Peter Y. A. Ryan Human Readable Paper Verification of Prêt à Voter. Search on Bibsonomy ESORICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Monirul Islam Sharif, Vinod Yegneswaran, Hassen Saïdi, Phillip A. Porras, Wenke Lee Eureka: A Framework for Enabling Static Malware Analysis. Search on Bibsonomy ESORICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Yannis Soupionis, Stelios Dritsas, Dimitris Gritzalis An Adaptive Policy-Based Approach to SPIT Management. Search on Bibsonomy ESORICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF SPIT, Policy, VoIP, Rules, Actions, Attack Graphs, Attack Trees
1Santiago Escobar 0001, Catherine Meadows 0001, José Meseguer 0001 State Space Reduction in the Maude-NRL Protocol Analyzer. Search on Bibsonomy ESORICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Deholo Nali, Paul C. van Oorschot CROO: A Universal Infrastructure and Protocol to Detect Identity Fraud. Search on Bibsonomy ESORICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Chengpo Mu, X. J. Li, Houkuan Huang, Shengfeng Tian Online Risk Assessment of Intrusion Scenarios Using D-S Evidence Theory. Search on Bibsonomy ESORICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Online Risk Assessment, Alert Processing, Intrusion Response, Intrusion detection, D-S Evidence Theory
1Bjørnar Solhaug, Ketil Stølen Compositional Refinement of Policies in UML - Exemplified for Access Control. Search on Bibsonomy ESORICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF policy adherence, access control, UML sequence diagrams, Policy specification, policy refinement
1Jay A. McCarthy, Shriram Krishnamurthi Cryptographic Protocol Explication and End-Point Projection. Search on Bibsonomy ESORICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Carlo Blundo, Emiliano De Cristofaro, Aniello Del Sorbo, Clemente Galdi, Giuseppe Persiano A Distributed Implementation of the Certified Information Access Service. Search on Bibsonomy ESORICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Charles C. Zhang, Marianne Winslett Distributed Authorization by Multiparty Trust Negotiation. Search on Bibsonomy ESORICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Sushil Jajodia, Javier López 0001 (eds.) Computer Security - ESORICS 2008, 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings Search on Bibsonomy ESORICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Rosario Gennaro, Shai Halevi, Hugo Krawczyk, Tal Rabin, Steffen Reidt, Stephen D. Wolthusen Strongly-Resilient and Non-interactive Hierarchical Key-Agreement in MANETs. Search on Bibsonomy ESORICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Kun Bai, Meng Yu 0001, Peng Liu 0005 TRACE: Zero-Down-Time Database Damage Tracking, Quarantine, and Cleansing with Negligible Run-Time Overhead. Search on Bibsonomy ESORICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Carlton R. Davis, Stephen Neville, José M. Fernandez 0001, Jean-Marc Robert 0001, John McHugh Structured Peer-to-Peer Overlay Networks: Ideal Botnets Command and Control Infrastructures?. Search on Bibsonomy ESORICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Ee-Chien Chang, Jia Xu 0006 Remote Integrity Check with Dishonest Storage Server. Search on Bibsonomy ESORICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Yingjiu Li, Haibing Lu Disclosure Analysis and Control in Statistical Databases. Search on Bibsonomy ESORICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Loïc Duflot CPU Bugs, CPU Backdoors and Consequences on Security. Search on Bibsonomy ESORICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF hardware bug, hardware backdoor, CPU, x86
1Claudia Díaz, Carmela Troncoso, Bart Preneel A Framework for the Analysis of Mix-Based Steganographic File Systems. Search on Bibsonomy ESORICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Pablo Neira Ayuso, Rafael M. Gasca, Laurent Lefèvre Multiprimary Support for the Availability of Cluster-Based Stateful Firewalls Using FT-FW. Search on Bibsonomy ESORICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Ching Yu Ng, Willy Susilo, Yi Mu 0001, Reihaneh Safavi-Naini RFID Privacy Models Revisited. Search on Bibsonomy ESORICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Athanasios N. Yannacopoulos, Costas Lambrinoudakis, Stefanos Gritzalis, Stylianos Z. Xanthopoulos, Sokratis K. Katsikas Modeling Privacy Insurance Contracts and Their Utilization in Risk Management for ICT Firms. Search on Bibsonomy ESORICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Random Utility Models, Privacy, Risk Modeling, Insurance
1Joan Tomàs-Buliart, Marcel Fernandez, Miguel Soriano New Considerations about the Correct Design of Turbo Fingerprinting Codes. Search on Bibsonomy ESORICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF collusion security, tracing traitor, turbo code, digital fingerprinting
1Carlo Blundo, Giuseppe Persiano, Ahmad-Reza Sadeghi, Ivan Visconti Improved Security Notions and Protocols for Non-transferable Identification. Search on Bibsonomy ESORICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Non-transferability, reset attacks, e-passports
1Jennifer Sobey, Robert Biddle, Paul C. van Oorschot, Andrew S. Patrick Exploring User Reactions to New Browser Cues for Extended Validation Certificates. Search on Bibsonomy ESORICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF extended validation certificates, user study, Usable security, browser security
1JungHoon Ha, Sang-Jae Moon, Jianying Zhou 0001, JaeCheol Ha A New Formal Proof Model for RFID Location Privacy. Search on Bibsonomy ESORICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF formal proof model, location privacy, RFID security
1Rinku Dewri, Indrakshi Ray, Indrajit Ray, L. Darrell Whitley Security Provisioning in Pervasive Environments Using Multi-objective Optimization. Search on Bibsonomy ESORICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Security, Pervasive computing, Multi-objective optimization
1Reginald E. Sawilla, Xinming Ou Identifying Critical Attack Assets in Dependency Attack Graphs. Search on Bibsonomy ESORICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF PageRank, eigenvector, security metric, attack graph
1Bezawada Bruhadeshwar, Sandeep S. Kulkarni, Alex X. Liu Symmetric Key Approaches to Securing BGP - A Little Bit Trust Is Enough. Search on Bibsonomy ESORICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Michael Backes 0001, Boris Köpf Formally Bounding the Side-Channel Leakage in Unknown-Message Attacks. Search on Bibsonomy ESORICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Qihua Wang, Ninghui Li, Hong Chen On the Security of Delegation in Access Control Systems. Search on Bibsonomy ESORICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Sebastian Gajek, Tibor Jager, Mark Manulis, Jörg Schwenk A Browser-Based Kerberos Authentication Scheme. Search on Bibsonomy ESORICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Gelareh Taban, Virgil D. Gligor Efficient Handling of Adversary Attacks in Aggregation Applications. Search on Bibsonomy ESORICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Roberto Di Pietro, Refik Molva Information Confinement, Privacy, and Security in RFID Systems. Search on Bibsonomy ESORICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Aldar C.-F. Chan, Claude Castelluccia On the Privacy of Concealed Data Aggregation. Search on Bibsonomy ESORICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Xiapu Luo, Edmond W. W. Chan, Rocky K. C. Chang Cloak: A Ten-Fold Way for Reliable Covert Communications. Search on Bibsonomy ESORICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF covert channel analysis, network security, attack models
1Valentina Ciriani, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati Fragmentation and Encryption to Enforce Privacy in Data Storage. Search on Bibsonomy ESORICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Privacy, encryption, fragmentation
1Jun Shao 0001, Zhenfu Cao, Licheng Wang, Rongxing Lu Efficient Password-Based Authenticated Key Exchange Without Public Information. Search on Bibsonomy ESORICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Hongxia Jin, Jeffery Lotspiech Renewable Traitor Tracing: A Trace-Revoke-Trace System For Anonymous Attack. Search on Bibsonomy ESORICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF anti-piracy, broadcast encryption, traitor tracing, Content protection
1Mikhail J. Atallah, Marina Blanton, Keith B. Frikken Incorporating Temporal Capabilities in Existing Key Management Schemes. Search on Bibsonomy ESORICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Sigrid Gürgens, Carsten Rudolph, Dirk Scheuermann, Marion Atts, Rainer Plaga Security Evaluation of Scenarios Based on the TCG's TPM Specification. Search on Bibsonomy ESORICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Ron van der Meyden What, Indeed, Is Intransitive Noninterference? Search on Bibsonomy ESORICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Véronique Cortier, Bogdan Warinschi, Eugen Zalinescu Synthesizing Secure Protocols. Search on Bibsonomy ESORICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Véronique Cortier, Ralf Küsters, Bogdan Warinschi A Cryptographic Model for Branching Time Security Properties - The Case of Contract Signing Protocols. Search on Bibsonomy ESORICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Joachim Biskup, Javier López 0001 (eds.) Computer Security - ESORICS 2007, 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24-26, 2007, Proceedings Search on Bibsonomy ESORICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Daniel J. Dougherty, Kathi Fisler, Shriram Krishnamurthi Obligations and Their Interaction with Programs. Search on Bibsonomy ESORICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Nayantara Mallesh, Matthew K. Wright Countering Statistical Disclosure with Receiver-Bound Cover Traffic. Search on Bibsonomy ESORICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF cover traffic, anonymity, privacy-enhancing technologies
1Vidyaraman Sankaranarayanan, Madhusudhanan Chandrasekaran, Shambhu J. Upadhyaya Towards Modeling Trust Based Decisions: A Game Theoretic Approach. Search on Bibsonomy ESORICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Trust, Game Theory, Decision Support, Risk, Incentives
1Manuel Hilty, Alexander Pretschner, David A. Basin, Christian Schaefer, Thomas Walter 0001 A Policy Language for Distributed Usage Control. Search on Bibsonomy ESORICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Paul Z. Kolano Maintaining High Performance Communication Under Least Privilege Using Dynamic Perimeter Control. Search on Bibsonomy ESORICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF multiport protocols, security, grids, Firewalls, high performance networking, network access control
1Gilles Barthe, Tamara Rezk, Alejandro Russo, Andrei Sabelfeld Security of Multithreaded Programs by Compilation. Search on Bibsonomy ESORICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Alex X. Liu Change-Impact Analysis of Firewall Policies. Search on Bibsonomy ESORICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Arnab Roy 0001, Anupam Datta, Ante Derek, John C. Mitchell Inductive Proofs of Computational Secrecy. Search on Bibsonomy ESORICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Juan Carlos López Pimentel, Raúl Monroy, Dieter Hutter On the Automated Correction of Security Protocols Susceptible to a Replay Attack. Search on Bibsonomy ESORICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Daniel J. Dougherty, Claude Kirchner, Hélène Kirchner, Anderson Santana de Oliveira Modular Access Control Via Strategic Rewriting. Search on Bibsonomy ESORICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Shaddin F. Doghmi, Joshua D. Guttman, F. Javier Thayer Completeness of the Authentication Tests. Search on Bibsonomy ESORICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Gabriel López Millán, Óscar Cánovas Reverte, Diego R. López, Antonio Fernandez Gómez-Skarmeta Extending the Common Services of eduGAIN with a Credential Conversion Service. Search on Bibsonomy ESORICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Qun Ni, Dan Lin 0001, Elisa Bertino, Jorge Lobo 0001 Conditional Privacy-Aware Role Based Access Control. Search on Bibsonomy ESORICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1André Adelsbach, Ulrich Greveler Insider Attacks Enabling Data Broadcasting on Crypto-Enforced Unicast Links. Search on Bibsonomy ESORICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Qihua Wang, Ninghui Li Satisfiability and Resiliency in Workflow Systems. Search on Bibsonomy ESORICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Konstantinos Chalkias, Dimitrios Hristu-Varsakelis, George Stephanides Improved Anonymous Timed-Release Encryption. Search on Bibsonomy ESORICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF pre-computations, multiple receivers, bilinear pairings, timed-release encryption
1Frederic Montagut, Refik Molva Traceability and Integrity of Execution in Distributed Workflow Management Systems. Search on Bibsonomy ESORICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Integrity of execution, Decentralized workflows, Traceability
1Sergei Evdokimov 0002, Oliver Günther 0001 Encryption Techniques for Secure Database Outsourcing. Search on Bibsonomy ESORICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Bo Luo, Dongwon Lee 0001, Peng Liu 0005 Pragmatic XML Access Control Using Off-the-Shelf RDBMS. Search on Bibsonomy ESORICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Sonia Chiasson, Paul C. van Oorschot, Robert Biddle Graphical Password Authentication Using Cued Click Points. Search on Bibsonomy ESORICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Authentication, User Study, Computer Security, Usable Security, Graphical Passwords
1Michel Abdalla, Eike Kiltz, Gregory Neven Generalized Key Delegation for Hierarchical Identity-Based Encryption. Search on Bibsonomy ESORICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Lujo Bauer, Scott Garriss, Michael K. Reiter Efficient Proving for Practical Distributed Access-Control Systems. Search on Bibsonomy ESORICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Steve Kremer, Laurent Mazaré Adaptive Soundness of Static Equivalence. Search on Bibsonomy ESORICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Michael K. Reiter Trustworthy Services and the Biological Analogy. Search on Bibsonomy ESORICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Kerstin Lemke-Rust, Christof Paar Analyzing Side Channel Leakage of Masked Implementations with Stochastic Methods. Search on Bibsonomy ESORICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Boolean Masking, Multivariate Side Channel Analysis, Higher-Order Side Channel Analysis, Stochastic Methods, Side Channel Cryptanalysis
1Eugene Y. Vasserman, Nicholas Hopper, John Laxson, James Tyra SilentKnock: Practical, Provably Undetectable Authentication. Search on Bibsonomy ESORICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Moritz Y. Becker, Sebastian Nanz A Logic for State-Modifying Authorization Policies. Search on Bibsonomy ESORICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Krzysztof Golofit Click Passwords Under Investigation. Search on Bibsonomy ESORICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Click Passwords, PassPoints, Passlogix, graphical authentication, picture passwords, human factor, dictionary attacks, keypad
1Sachiko Yoshihama, Takeo Yoshizawa, Yuji Watanabe, Michiharu Kudo, Kazuko Oyanagi Dynamic Information Flow Control Architecture for Web Applications. Search on Bibsonomy ESORICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Guofei Gu, Prahlad Fogla, David Dagon, Wenke Lee, Boris Skoric Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems. Search on Bibsonomy ESORICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Frédéric Besson, Guillaume Dufay, Thomas P. Jensen A Formal Model of Access Control for Mobile Interactive Devices. Search on Bibsonomy ESORICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Ted Huffmire, Shreyas Prasad, Timothy Sherwood, Ryan Kastner Policy-Driven Memory Protection for Reconfigurable Hardware. Search on Bibsonomy ESORICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Embedded Systems, Computer Security, Security Policies, Policy Languages, Reference Monitors, Separation Kernels
Displaying result #201 - #300 of 570 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license