Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Giovanni Di Crescenzo, Shaoquan Jiang, Reihaneh Safavi-Naini |
Corruption-Localizing Hashing. |
ESORICS |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Ahren Studer, Adrian Perrig |
The Coremelt Attack. |
ESORICS |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Valentina Ciriani, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati |
Keep a Few: Outsourcing Data While Maintaining Confidentiality. |
ESORICS |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Ching Yu Ng, Willy Susilo, Yi Mu 0001, Reihaneh Safavi-Naini |
New Privacy Results on Synchronized RFID Authentication Protocols against Tag Tracing. |
ESORICS |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Yali Liu, Dipak Ghosal, Frederik Armknecht, Ahmad-Reza Sadeghi, Steffen Schulz 0001, Stefan Katzenbeisser 0001 |
Hide and Seek in Time - Robust Covert Timing Channels. |
ESORICS |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Peter Wurzinger, Leyla Bilge, Thorsten Holz, Jan Goebel, Christopher Kruegel, Engin Kirda |
Automatically Generating Models for Botnet Detection. |
ESORICS |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Qian Wang 0002, Cong Wang 0001, Jin Li 0002, Kui Ren 0001, Wenjing Lou |
Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing. |
ESORICS |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Alina Oprea, Kevin D. Bowers |
Authentic Time-Stamps for Archival Storage. |
ESORICS |
2009 |
DBLP DOI BibTeX RDF |
authenticated data structures, time-stamping, regulatory compliance, archival storage |
1 | Liang Chen, Jason Crampton |
Set Covering Problems in Role-Based Access Control. |
ESORICS |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Tiancheng Li, Xiaonan Ma, Ninghui Li |
WORM-SEAL: Trustworthy Data Retention and Verification for Regulatory Compliance. |
ESORICS |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Nils Ole Tippenhauer, Srdjan Capkun |
ID-Based Secure Distance Bounding and Localization. |
ESORICS |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Yossi Gilad, Amir Herzberg |
Lightweight Opportunistic Tunneling (LOT). |
ESORICS |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Michael LeMay, Carl A. Gunter |
Cumulative Attestation Kernels for Embedded Systems. |
ESORICS |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Ton van Deursen, Sjouke Mauw, Sasa Radomirovic, Pim Vullers |
Secure Ownership and Ownership Transfer in RFID Systems. |
ESORICS |
2009 |
DBLP DOI BibTeX RDF |
RFID protocols, desynchronization resistance, formal verification, ownership, ownership transfer |
1 | David A. Basin, Samuel J. Burri, Günter Karjoth |
Dynamic Enforcement of Abstract Separation of Duty Constraints. |
ESORICS |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Yanlin Peng, Linfeng Zhang, J. Morris Chang, Yong Guan |
An Effective Method for Combating Malicious Scripts Clickbots. |
ESORICS |
2009 |
DBLP DOI BibTeX RDF |
Online Advertising Networks, Network Forensics, Attack Detection, Click Fraud |
1 | Ravinder Shankesi, Musab AlTurki, Ralf Sasse, Carl A. Gunter, José Meseguer 0001 |
Model-Checking DoS Amplification for VoIP Session Initiation. |
ESORICS |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Qihua Wang, Hongxia Jin, Ninghui Li |
Usable Access Control in Collaborative Environments: Authorization Based on People-Tagging. |
ESORICS |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Hong Chen, Xiaonan Ma, Windsor W. Hsu, Ninghui Li, Qihua Wang |
Access Control Friendly Query Verification for Outsourced Data Publishing. |
ESORICS |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Sergio Maffeis, Martín Abadi, Cédric Fournet, Andrew D. Gordon 0001 |
Code-Carrying Authorization. |
ESORICS |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Dan Bogdanov, Sven Laur, Jan Willemson |
Sharemind: A Framework for Fast Privacy-Preserving Computations. |
ESORICS |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Aslan Askarov, Sebastian Hunt, Andrei Sabelfeld, David Sands 0001 |
Termination-Insensitive Noninterference Leaks More Than Just a Bit. |
ESORICS |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Juan Pedro Muñoz-Gea, Josemaria Malgosa-Sanahuja, Pilar Manzanares-Lopez, Juan Carlos Sánchez-Aarnoutse, Joan García-Haro |
A Low-Variance Random-Walk Procedure to Provide Anonymity in Overlay Networks. |
ESORICS |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Flavio D. Garcia, Gerhard de Koning Gans, Ruben Muijrers, Peter van Rossum, Roel Verdult, Ronny Wichers Schreur, Bart Jacobs 0001 |
Dismantling MIFARE Classic. |
ESORICS |
2008 |
DBLP DOI BibTeX RDF |
|
1 | David Lundin, Peter Y. A. Ryan |
Human Readable Paper Verification of Prêt à Voter. |
ESORICS |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Monirul Islam Sharif, Vinod Yegneswaran, Hassen Saïdi, Phillip A. Porras, Wenke Lee |
Eureka: A Framework for Enabling Static Malware Analysis. |
ESORICS |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Yannis Soupionis, Stelios Dritsas, Dimitris Gritzalis |
An Adaptive Policy-Based Approach to SPIT Management. |
ESORICS |
2008 |
DBLP DOI BibTeX RDF |
SPIT, Policy, VoIP, Rules, Actions, Attack Graphs, Attack Trees |
1 | Santiago Escobar 0001, Catherine Meadows 0001, José Meseguer 0001 |
State Space Reduction in the Maude-NRL Protocol Analyzer. |
ESORICS |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Deholo Nali, Paul C. van Oorschot |
CROO: A Universal Infrastructure and Protocol to Detect Identity Fraud. |
ESORICS |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Chengpo Mu, X. J. Li, Houkuan Huang, Shengfeng Tian |
Online Risk Assessment of Intrusion Scenarios Using D-S Evidence Theory. |
ESORICS |
2008 |
DBLP DOI BibTeX RDF |
Online Risk Assessment, Alert Processing, Intrusion Response, Intrusion detection, D-S Evidence Theory |
1 | Bjørnar Solhaug, Ketil Stølen |
Compositional Refinement of Policies in UML - Exemplified for Access Control. |
ESORICS |
2008 |
DBLP DOI BibTeX RDF |
policy adherence, access control, UML sequence diagrams, Policy specification, policy refinement |
1 | Jay A. McCarthy, Shriram Krishnamurthi |
Cryptographic Protocol Explication and End-Point Projection. |
ESORICS |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Carlo Blundo, Emiliano De Cristofaro, Aniello Del Sorbo, Clemente Galdi, Giuseppe Persiano |
A Distributed Implementation of the Certified Information Access Service. |
ESORICS |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Charles C. Zhang, Marianne Winslett |
Distributed Authorization by Multiparty Trust Negotiation. |
ESORICS |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Sushil Jajodia, Javier López 0001 (eds.) |
Computer Security - ESORICS 2008, 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings |
ESORICS |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Rosario Gennaro, Shai Halevi, Hugo Krawczyk, Tal Rabin, Steffen Reidt, Stephen D. Wolthusen |
Strongly-Resilient and Non-interactive Hierarchical Key-Agreement in MANETs. |
ESORICS |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Kun Bai, Meng Yu 0001, Peng Liu 0005 |
TRACE: Zero-Down-Time Database Damage Tracking, Quarantine, and Cleansing with Negligible Run-Time Overhead. |
ESORICS |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Carlton R. Davis, Stephen Neville, José M. Fernandez 0001, Jean-Marc Robert 0001, John McHugh |
Structured Peer-to-Peer Overlay Networks: Ideal Botnets Command and Control Infrastructures?. |
ESORICS |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Ee-Chien Chang, Jia Xu 0006 |
Remote Integrity Check with Dishonest Storage Server. |
ESORICS |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Yingjiu Li, Haibing Lu |
Disclosure Analysis and Control in Statistical Databases. |
ESORICS |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Loïc Duflot |
CPU Bugs, CPU Backdoors and Consequences on Security. |
ESORICS |
2008 |
DBLP DOI BibTeX RDF |
hardware bug, hardware backdoor, CPU, x86 |
1 | Claudia Díaz, Carmela Troncoso, Bart Preneel |
A Framework for the Analysis of Mix-Based Steganographic File Systems. |
ESORICS |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Pablo Neira Ayuso, Rafael M. Gasca, Laurent Lefèvre |
Multiprimary Support for the Availability of Cluster-Based Stateful Firewalls Using FT-FW. |
ESORICS |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Ching Yu Ng, Willy Susilo, Yi Mu 0001, Reihaneh Safavi-Naini |
RFID Privacy Models Revisited. |
ESORICS |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Athanasios N. Yannacopoulos, Costas Lambrinoudakis, Stefanos Gritzalis, Stylianos Z. Xanthopoulos, Sokratis K. Katsikas |
Modeling Privacy Insurance Contracts and Their Utilization in Risk Management for ICT Firms. |
ESORICS |
2008 |
DBLP DOI BibTeX RDF |
Random Utility Models, Privacy, Risk Modeling, Insurance |
1 | Joan Tomàs-Buliart, Marcel Fernandez, Miguel Soriano |
New Considerations about the Correct Design of Turbo Fingerprinting Codes. |
ESORICS |
2008 |
DBLP DOI BibTeX RDF |
collusion security, tracing traitor, turbo code, digital fingerprinting |
1 | Carlo Blundo, Giuseppe Persiano, Ahmad-Reza Sadeghi, Ivan Visconti |
Improved Security Notions and Protocols for Non-transferable Identification. |
ESORICS |
2008 |
DBLP DOI BibTeX RDF |
Non-transferability, reset attacks, e-passports |
1 | Jennifer Sobey, Robert Biddle, Paul C. van Oorschot, Andrew S. Patrick |
Exploring User Reactions to New Browser Cues for Extended Validation Certificates. |
ESORICS |
2008 |
DBLP DOI BibTeX RDF |
extended validation certificates, user study, Usable security, browser security |
1 | JungHoon Ha, Sang-Jae Moon, Jianying Zhou 0001, JaeCheol Ha |
A New Formal Proof Model for RFID Location Privacy. |
ESORICS |
2008 |
DBLP DOI BibTeX RDF |
formal proof model, location privacy, RFID security |
1 | Rinku Dewri, Indrakshi Ray, Indrajit Ray, L. Darrell Whitley |
Security Provisioning in Pervasive Environments Using Multi-objective Optimization. |
ESORICS |
2008 |
DBLP DOI BibTeX RDF |
Security, Pervasive computing, Multi-objective optimization |
1 | Reginald E. Sawilla, Xinming Ou |
Identifying Critical Attack Assets in Dependency Attack Graphs. |
ESORICS |
2008 |
DBLP DOI BibTeX RDF |
PageRank, eigenvector, security metric, attack graph |
1 | Bezawada Bruhadeshwar, Sandeep S. Kulkarni, Alex X. Liu |
Symmetric Key Approaches to Securing BGP - A Little Bit Trust Is Enough. |
ESORICS |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Michael Backes 0001, Boris Köpf |
Formally Bounding the Side-Channel Leakage in Unknown-Message Attacks. |
ESORICS |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Qihua Wang, Ninghui Li, Hong Chen |
On the Security of Delegation in Access Control Systems. |
ESORICS |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Sebastian Gajek, Tibor Jager, Mark Manulis, Jörg Schwenk |
A Browser-Based Kerberos Authentication Scheme. |
ESORICS |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Gelareh Taban, Virgil D. Gligor |
Efficient Handling of Adversary Attacks in Aggregation Applications. |
ESORICS |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Roberto Di Pietro, Refik Molva |
Information Confinement, Privacy, and Security in RFID Systems. |
ESORICS |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Aldar C.-F. Chan, Claude Castelluccia |
On the Privacy of Concealed Data Aggregation. |
ESORICS |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Xiapu Luo, Edmond W. W. Chan, Rocky K. C. Chang |
Cloak: A Ten-Fold Way for Reliable Covert Communications. |
ESORICS |
2007 |
DBLP DOI BibTeX RDF |
covert channel analysis, network security, attack models |
1 | Valentina Ciriani, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati |
Fragmentation and Encryption to Enforce Privacy in Data Storage. |
ESORICS |
2007 |
DBLP DOI BibTeX RDF |
Privacy, encryption, fragmentation |
1 | Jun Shao 0001, Zhenfu Cao, Licheng Wang, Rongxing Lu |
Efficient Password-Based Authenticated Key Exchange Without Public Information. |
ESORICS |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Hongxia Jin, Jeffery Lotspiech |
Renewable Traitor Tracing: A Trace-Revoke-Trace System For Anonymous Attack. |
ESORICS |
2007 |
DBLP DOI BibTeX RDF |
anti-piracy, broadcast encryption, traitor tracing, Content protection |
1 | Mikhail J. Atallah, Marina Blanton, Keith B. Frikken |
Incorporating Temporal Capabilities in Existing Key Management Schemes. |
ESORICS |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Sigrid Gürgens, Carsten Rudolph, Dirk Scheuermann, Marion Atts, Rainer Plaga |
Security Evaluation of Scenarios Based on the TCG's TPM Specification. |
ESORICS |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Ron van der Meyden |
What, Indeed, Is Intransitive Noninterference? |
ESORICS |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Véronique Cortier, Bogdan Warinschi, Eugen Zalinescu |
Synthesizing Secure Protocols. |
ESORICS |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Véronique Cortier, Ralf Küsters, Bogdan Warinschi |
A Cryptographic Model for Branching Time Security Properties - The Case of Contract Signing Protocols. |
ESORICS |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Joachim Biskup, Javier López 0001 (eds.) |
Computer Security - ESORICS 2007, 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24-26, 2007, Proceedings |
ESORICS |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Daniel J. Dougherty, Kathi Fisler, Shriram Krishnamurthi |
Obligations and Their Interaction with Programs. |
ESORICS |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Nayantara Mallesh, Matthew K. Wright |
Countering Statistical Disclosure with Receiver-Bound Cover Traffic. |
ESORICS |
2007 |
DBLP DOI BibTeX RDF |
cover traffic, anonymity, privacy-enhancing technologies |
1 | Vidyaraman Sankaranarayanan, Madhusudhanan Chandrasekaran, Shambhu J. Upadhyaya |
Towards Modeling Trust Based Decisions: A Game Theoretic Approach. |
ESORICS |
2007 |
DBLP DOI BibTeX RDF |
Trust, Game Theory, Decision Support, Risk, Incentives |
1 | Manuel Hilty, Alexander Pretschner, David A. Basin, Christian Schaefer, Thomas Walter 0001 |
A Policy Language for Distributed Usage Control. |
ESORICS |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Paul Z. Kolano |
Maintaining High Performance Communication Under Least Privilege Using Dynamic Perimeter Control. |
ESORICS |
2007 |
DBLP DOI BibTeX RDF |
multiport protocols, security, grids, Firewalls, high performance networking, network access control |
1 | Gilles Barthe, Tamara Rezk, Alejandro Russo, Andrei Sabelfeld |
Security of Multithreaded Programs by Compilation. |
ESORICS |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Alex X. Liu |
Change-Impact Analysis of Firewall Policies. |
ESORICS |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Arnab Roy 0001, Anupam Datta, Ante Derek, John C. Mitchell |
Inductive Proofs of Computational Secrecy. |
ESORICS |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Juan Carlos López Pimentel, Raúl Monroy, Dieter Hutter |
On the Automated Correction of Security Protocols Susceptible to a Replay Attack. |
ESORICS |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Daniel J. Dougherty, Claude Kirchner, Hélène Kirchner, Anderson Santana de Oliveira |
Modular Access Control Via Strategic Rewriting. |
ESORICS |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Shaddin F. Doghmi, Joshua D. Guttman, F. Javier Thayer |
Completeness of the Authentication Tests. |
ESORICS |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Gabriel López Millán, Óscar Cánovas Reverte, Diego R. López, Antonio Fernandez Gómez-Skarmeta |
Extending the Common Services of eduGAIN with a Credential Conversion Service. |
ESORICS |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Qun Ni, Dan Lin 0001, Elisa Bertino, Jorge Lobo 0001 |
Conditional Privacy-Aware Role Based Access Control. |
ESORICS |
2007 |
DBLP DOI BibTeX RDF |
|
1 | André Adelsbach, Ulrich Greveler |
Insider Attacks Enabling Data Broadcasting on Crypto-Enforced Unicast Links. |
ESORICS |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Qihua Wang, Ninghui Li |
Satisfiability and Resiliency in Workflow Systems. |
ESORICS |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Konstantinos Chalkias, Dimitrios Hristu-Varsakelis, George Stephanides |
Improved Anonymous Timed-Release Encryption. |
ESORICS |
2007 |
DBLP DOI BibTeX RDF |
pre-computations, multiple receivers, bilinear pairings, timed-release encryption |
1 | Frederic Montagut, Refik Molva |
Traceability and Integrity of Execution in Distributed Workflow Management Systems. |
ESORICS |
2007 |
DBLP DOI BibTeX RDF |
Integrity of execution, Decentralized workflows, Traceability |
1 | Sergei Evdokimov 0002, Oliver Günther 0001 |
Encryption Techniques for Secure Database Outsourcing. |
ESORICS |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Bo Luo, Dongwon Lee 0001, Peng Liu 0005 |
Pragmatic XML Access Control Using Off-the-Shelf RDBMS. |
ESORICS |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Sonia Chiasson, Paul C. van Oorschot, Robert Biddle |
Graphical Password Authentication Using Cued Click Points. |
ESORICS |
2007 |
DBLP DOI BibTeX RDF |
Authentication, User Study, Computer Security, Usable Security, Graphical Passwords |
1 | Michel Abdalla, Eike Kiltz, Gregory Neven |
Generalized Key Delegation for Hierarchical Identity-Based Encryption. |
ESORICS |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Lujo Bauer, Scott Garriss, Michael K. Reiter |
Efficient Proving for Practical Distributed Access-Control Systems. |
ESORICS |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Steve Kremer, Laurent Mazaré |
Adaptive Soundness of Static Equivalence. |
ESORICS |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Michael K. Reiter |
Trustworthy Services and the Biological Analogy. |
ESORICS |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Kerstin Lemke-Rust, Christof Paar |
Analyzing Side Channel Leakage of Masked Implementations with Stochastic Methods. |
ESORICS |
2007 |
DBLP DOI BibTeX RDF |
Boolean Masking, Multivariate Side Channel Analysis, Higher-Order Side Channel Analysis, Stochastic Methods, Side Channel Cryptanalysis |
1 | Eugene Y. Vasserman, Nicholas Hopper, John Laxson, James Tyra |
SilentKnock: Practical, Provably Undetectable Authentication. |
ESORICS |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Moritz Y. Becker, Sebastian Nanz |
A Logic for State-Modifying Authorization Policies. |
ESORICS |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Krzysztof Golofit |
Click Passwords Under Investigation. |
ESORICS |
2007 |
DBLP DOI BibTeX RDF |
Click Passwords, PassPoints, Passlogix, graphical authentication, picture passwords, human factor, dictionary attacks, keypad |
1 | Sachiko Yoshihama, Takeo Yoshizawa, Yuji Watanabe, Michiharu Kudo, Kazuko Oyanagi |
Dynamic Information Flow Control Architecture for Web Applications. |
ESORICS |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Guofei Gu, Prahlad Fogla, David Dagon, Wenke Lee, Boris Skoric |
Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems. |
ESORICS |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Frédéric Besson, Guillaume Dufay, Thomas P. Jensen |
A Formal Model of Access Control for Mobile Interactive Devices. |
ESORICS |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Ted Huffmire, Shreyas Prasad, Timothy Sherwood, Ryan Kastner |
Policy-Driven Memory Protection for Reconfigurable Hardware. |
ESORICS |
2006 |
DBLP DOI BibTeX RDF |
Embedded Systems, Computer Security, Security Policies, Policy Languages, Reference Monitors, Separation Kernels |