Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Michael Backes 0001, Markus Dürmuth, Dennis Hofheinz, Ralf Küsters |
Conditional Reactive Simulatability. |
ESORICS |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Xibin Zhao, Kwok-Yan Lam, Guiming Luo, Siu Leung Chung, Ming Gu 0001 |
Minimal Threshold Closure. |
ESORICS |
2006 |
DBLP DOI BibTeX RDF |
Threshold Closure, Access Control, Authorization, Threshold Schemes |
1 | Peter Y. A. Ryan, Steve A. Schneider |
Prêt à Voter with Re-encryption Mixes. |
ESORICS |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Michael Backes 0001, Birgit Pfitzmann, Michael Waidner |
Limits of the BRSIM/UC Soundness of Dolev-Yao Models with Hashes. |
ESORICS |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Dusko Pavlovic, Catherine Meadows 0001 |
Deriving Secrecy in Key Establishment Protocols. |
ESORICS |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Daniel Mellado, Eduardo Fernández-Medina, Mario Piattini |
Applying a Security Requirements Engineering Process. |
ESORICS |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Jing Wang, Yoshiaki Takata, Hiroyuki Seki |
HBAC: A Model for History-Based Access Control and Its Model Checking. |
ESORICS |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Joaquín García-Alfaro, Frédéric Cuppens, Nora Cuppens-Boulahia |
Analysis of Policy Anomalies on Distributed Network Security Setups. |
ESORICS |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Shuhong Wang 0001, Xuhua Ding, Robert H. Deng, Feng Bao 0001 |
Private Information Retrieval Using Trusted Hardware. |
ESORICS |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Philip W. L. Fong |
Discretionary Capability Confinement. |
ESORICS |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Hao Wang, Somesh Jha, Thomas W. Reps, Stefan Schwoon, Stuart G. Stubblebine |
Reducing the Dependence of SPKI/SDSI on PKI. |
ESORICS |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Vitaly Shmatikov, Ming-Hsiu Wang |
Timing Analysis in Low-Latency Mix Networks: Attacks and Defenses. |
ESORICS |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Gabriel Maciá-Fernández, Jesús Esteban Díaz Verdejo, Pedro Garcia-Teodoro |
Assessment of a Vulnerability in Iterative Servers Enabling Low-Rate DoS Attacks. |
ESORICS |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Michael Backes 0001, Christian Cachin, Alina Oprea |
Secure Key-Updating for Lazy Revocation. |
ESORICS |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Yuji Watanabe, Sachiko Yoshihama, Takuya Mishina, Michiharu Kudo, Hiroshi Maruyama |
Bridging the Gap Between Inter-communication Boundary and Internal Trusted Components. |
ESORICS |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Mudhakar Srivatsa, Ling Liu 0001 |
Key Derivation Algorithms for Monotone Access Structures in Cryptographic File Systems. |
ESORICS |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Milan Fort, Felix C. Freiling, Lucia Draque Penso, Zinaida Benenson, Dogan Kesdogan |
TrustedPals: Secure Multiparty Computation Implemented with Smart Cards. |
ESORICS |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Thomas Santen |
A Formal Framework for Confidentiality-Preserving Refinement. |
ESORICS |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Jason Crampton, Hemanth Khambhammettu |
Delegation in Role-Based Access Control. |
ESORICS |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Alex Hai Wang, Peng Liu 0005 |
Modeling and Evaluating the Survivability of an Intrusion Tolerant Database System. |
ESORICS |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Zhiqiang Yang, Sheng Zhong 0002, Rebecca N. Wright |
Privacy-Preserving Queries on Encrypted Data. |
ESORICS |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Cheun Ngen Chong, Sorin M. Iacob, R. Paul Koster, Javier Montaner, René van Buuren |
License Transfer in OMA-DRM. |
ESORICS |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Dieter Gollmann, Jan Meier, Andrei Sabelfeld (eds.) |
Computer Security - ESORICS 2006, 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings |
ESORICS |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Deepak Garg 0001, Lujo Bauer, Kevin D. Bowers, Frank Pfenning, Michael K. Reiter |
A Linear Logic of Authorization and Knowledge. |
ESORICS |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Michael Backes 0001, Iliano Cervesato, Aaron D. Jaggard, Andre Scedrov, Joe-Kai Tsay |
Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos. |
ESORICS |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Martin Johns |
SessionSafe: Implementing XSS Immune Session Handling. |
ESORICS |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Boris Köpf, David A. Basin |
Timing-Sensitive Information Flow Analysis for Synchronous Systems. |
ESORICS |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Michael P. Collins, Michael K. Reiter |
Finding Peer-to-Peer File-Sharing Using Coarse Network Behaviors. |
ESORICS |
2006 |
DBLP DOI BibTeX RDF |
|
1 | David A. Naumann |
From Coupling Relations to Mated Invariants for Checking Information Flow. |
ESORICS |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Abdellatif Benjelloun Touimi, Jean-Bernard Fischer, Caroline Fontaine, Christophe Giraud 0001, Michel Milhau |
Enhanced Security Architecture for Music Distribution on Mobile. |
ESORICS |
2006 |
DBLP DOI BibTeX RDF |
OMA DRM, mobile, cryptography, watermarking, audio, Content distribution, smartcard, digital rights management (DRM) |
1 | Vijayalakshmi Atluri, Qi Guo |
Unified Index for Mobile Object Data and Authorizations. |
ESORICS |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Giuseppe Ateniese, Daniel H. Chou, Breno de Medeiros, Gene Tsudik |
Sanitizable Signatures. |
ESORICS |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Karsten Sohr, Gail-Joon Ahn, Martin Gogolla, Lars Migge |
Specification and Validation of Authorisation Constraints Using UML and OCL. |
ESORICS |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Sabrina De Capitani di Vimercati, Paul F. Syverson, Dieter Gollmann (eds.) |
Computer Security - ESORICS 2005, 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings |
ESORICS |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Pedro Adão, Gergei Bana, Jonathan Herzog, Andre Scedrov |
Soundness of Formal Encryption in the Presence of Key-Cycles. |
ESORICS |
2005 |
DBLP DOI BibTeX RDF |
|
1 | George Danezis, Chris Lesniewski-Laas, M. Frans Kaashoek, Ross J. Anderson |
Sybil-Resistant DHT Routing. |
ESORICS |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Huafei Zhu, Feng Bao 0001 |
Augmented Oblivious Polynomial Evaluation Protocol and Its Applications. |
ESORICS |
2005 |
DBLP DOI BibTeX RDF |
Augmented oblivious polynomial evaluation, homomorphic commitment scheme, homomorphic public key encryption |
1 | Indrajit Ray, Nayot Poolsapassit |
Using Attack Trees to Identify Malicious Attacks from Authorized Insiders. |
ESORICS |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Jay Ligatti, Lujo Bauer, David Walker 0001 |
Enforcing Non-safety Security Policies with Program Monitors. |
ESORICS |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Marcin Gogolewski, Marek Klonowski, Miroslaw Kutylowski |
Local View Attack on Anonymous Communication. |
ESORICS |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Manuel Hilty, David A. Basin, Alexander Pretschner |
On Obligations. |
ESORICS |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Michael Backes 0001 |
Quantifying Probabilistic Information Flow in Computational Reactive Systems. |
ESORICS |
2005 |
DBLP DOI BibTeX RDF |
|
1 | David Chaum, Peter Y. A. Ryan, Steve A. Schneider |
A Practical Voter-Verifiable Election Scheme. |
ESORICS |
2005 |
DBLP DOI BibTeX RDF |
|
1 | João Porto de Albuquerque, Heiko Krumm, Paulo Lício de Geus |
On Scalability and Modularisation in the Modelling of Network Security Systems. |
ESORICS |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Fabio Massacci, John Mylopoulos, Nicola Zannone |
Minimal Disclosure in Hierarchical Hippocratic Databases with Delegation. |
ESORICS |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Barbara Simons |
Computerized Voting Machines: A View from the Trenches. |
ESORICS |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Aslan Askarov, Andrei Sabelfeld |
Security-Typed Languages for Implementation of Cryptographic Protocols: A Case Study. |
ESORICS |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Sigrid Gürgens, Peter Ochsenschläger, Carsten Rudolph |
Abstractions Preserving Parameter Confidentiality. |
ESORICS |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Rajeev Gupta, Manish Bhide |
A Generic XACML Based Declarative Authorization Scheme for Java. |
ESORICS |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Thomas Groß 0001, Birgit Pfitzmann, Ahmad-Reza Sadeghi |
Browser Model for Security Analysis of Browser-Based Protocols. |
ESORICS |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Sabrina Tarento |
Machine-Checked Security Proofs of Cryptographic Signature Schemes. |
ESORICS |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Giovanni Di Crescenzo, Abhrajit Ghosh, Rajesh Talpade |
Towards a Theory of Intrusion Detection. |
ESORICS |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Lingyu Wang 0001, Anyi Liu, Sushil Jajodia |
An Efficient and Unified Approach to Correlating, Hypothesizing, and Predicting Intrusion Alerts. |
ESORICS |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Mariemma Inmaculada Yagüe del Valle, María-del-Mar Gallardo, Antonio Mana |
Semantic Access Control Model: A Formal Specification. |
ESORICS |
2005 |
DBLP DOI BibTeX RDF |
Formal Methods in security, Access Control, Authorization, Distributed Systems Security |
1 | Naizhen Qi, Michiharu Kudo |
XML Access Control with Policy Matching Tree. |
ESORICS |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Somesh Jha, Louis Kruger, Patrick D. McDaniel |
Privacy Preserving Clustering. |
ESORICS |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Felix C. Freiling, Thorsten Holz, Georg Wicherski |
Botnet Tracking: Exploring a Root-Cause Methodology to Prevent Distributed Denial-of-Service Attacks. |
ESORICS |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Kristian Gjøsteen |
Security Notions for Disk Encryption. |
ESORICS |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Michael Backes 0001, Birgit Pfitzmann |
Limits of the Cryptographic Realization of Dolev-Yao-Style XOR. |
ESORICS |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Indrajit Ray, Sudip Chakraborty |
A Vector Model of Trust for Developing Trustworthy Systems. |
ESORICS |
2004 |
DBLP DOI BibTeX RDF |
|
1 | James Aspnes, Joan Feigenbaum, Aleksandr Yampolskiy, Sheng Zhong 0002 |
Towards a Theory of Data Entanglement: (Extended Abstract). |
ESORICS |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Pierangela Samarati, Peter Y. A. Ryan, Dieter Gollmann, Refik Molva (eds.) |
Computer Security - ESORICS 2004, 9th European Symposium on Research Computer Security, Sophia Antipolis, France, September 13-15, 2004, Proceedings |
ESORICS |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Mikhail J. Atallah, Marina Bykova |
Portable and Flexible Document Access Control Mechanisms. |
ESORICS |
2004 |
DBLP DOI BibTeX RDF |
|
1 | David von Oheimb |
Information Flow Control Revisited: Noninfluence = Noninterference + Nonleakage. |
ESORICS |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Bev Littlewood, Lorenzo Strigini |
Redundancy and Diversity in Security. |
ESORICS |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Rainer Böhme, Andreas Westfeld |
Breaking Cauchy Model-Based JPEG Steganography with First Order Statistics. |
ESORICS |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Michael J. Covington, Mustaque Ahamad, Irfan A. Essa, H. Venkateswaran |
Parameterized Authentication. |
ESORICS |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Naizhen Qi, Michiharu Kudo |
Access-Condition-Table-Driven Access Control for XML Databases. |
ESORICS |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Michael Backes 0001, Markus Dürmuth, Rainer Steinwandt |
An Algebra for Composing Enterprise Privacy Policies. |
ESORICS |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Dieter Hutter, Axel Schairer |
Possibilistic Information Flow Control in the Presence of Encrypted Communication. |
ESORICS |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Bodo Möller |
A Public-Key Encryption Scheme with Pseudo-random Ciphertexts. |
ESORICS |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Sjouke Mauw, Jan Verschuren, Erik P. de Vink |
A Formalization of Anonymity and Onion Routing. |
ESORICS |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Julian B. Grizzard, John G. Levine, Henry L. Owen |
Re-establishing Trust in Compromised Systems: Recovering from Rootkits That Trojan the System Call Table. |
ESORICS |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Michael Backes 0001 |
A Cryptographically Sound Dolev-Yao Style Security Proof of the Otway-Rees Protocol. |
ESORICS |
2004 |
DBLP DOI BibTeX RDF |
|
1 | John McHugh |
Sets, Bags, and Rock and Roll: Analyzing Large Data Sets of Network Data. |
ESORICS |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Seyit Ahmet Çamtepe, Bülent Yener |
Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks. |
ESORICS |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Jan Camenisch |
Better Privacy for Trusted Computing Platforms: (Extended Abstract). |
ESORICS |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Xinzhou Qin, Wenke Lee |
Discovering Novel Attack Strategies from INFOSEC Alerts. |
ESORICS |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Jon A. Solworth, Robert H. Sloan |
Security Property Based Administrative Controls. |
ESORICS |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Claudia Díaz, Len Sassaman, Evelyne Dewitte |
Comparison Between Two Practical Mix Designs. |
ESORICS |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Shiping Chen 0003, Duminda Wijesekera, Sushil Jajodia |
Incorporating Dynamic Constraints in the Flexible Authorization Framework. |
ESORICS |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Catherine Meadows 0001, Dusko Pavlovic |
Deriving, Attacking and Defending the GDOI Protocol. |
ESORICS |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Einar Mykletun, Maithili Narasimha, Gene Tsudik |
Signature Bouquets: Immutability for Aggregated/Condensed Signatures. |
ESORICS |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Ramkumar Chinchani, Anusha Iyer, Bharat Jayaraman, Shambhu J. Upadhyaya |
ARCHERR: Runtime Environment Driven Program Safety. |
ESORICS |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Roberto Battistoni, Emanuele Gabrielli, Luigi V. Mancini |
A Host Intrusion Prevention System for Windows Operating Systems. |
ESORICS |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Claude Castelluccia, Gabriel Montenegro, Julien Laganier, Christoph Neumann 0001 |
Hindering Eavesdropping via IPv6 Opportunistic Encryption. |
ESORICS |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Lars R. Knudsen, John Erik Mathiassen |
On the Role of Key Schedules in Attacks on Iterated Ciphers. |
ESORICS |
2004 |
DBLP DOI BibTeX RDF |
|
1 | David von Oheimb, Georg Walter, Volkmar Lotz |
A Formal Security Model of the Infineon SLE 88 Smart Card Memory Managment. |
ESORICS |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Rogardt Heldal, Fredrik Hultin |
Bridging Model-Based and Language-Based Security. |
ESORICS |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Xuhui Ao, Naftaly H. Minsky |
Flexible Regulation of Distributed Coalitions. |
ESORICS |
2003 |
DBLP DOI BibTeX RDF |
Distributed coalition, Decentralized regulatory mechanism, Policy hierarchy, Policy interoperability, Security policy, Law-Governed Interaction |
1 | Lingyu Wang 0001, Yingjiu Li, Duminda Wijesekera, Sushil Jajodia |
Precisely Answering Multi-dimensional Range Queries without Privacy Breaches. |
ESORICS |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Stefan Axelsson |
Visualisation for Intrusion Detection. |
ESORICS |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Marcin Gomulkiewicz, Marek Klonowski, Miroslaw Kutylowski |
Rapid Mixing and Security of Chaum's Visual Electronic Voting. |
ESORICS |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Yuji Watanabe, Masayuki Numao |
Multi-round Secure-Light Broadcast Exclusion Protocol with Pre-processing. |
ESORICS |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Christopher Krügel, Darren Mutz, Fredrik Valeur, Giovanni Vigna |
On the Detection of Anomalous System Call Arguments. |
ESORICS |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Einar Snekkenes, Dieter Gollmann (eds.) |
Computer Security - ESORICS 2003, 8th European Symposium on Research in Computer Security, Gjøvik, Norway, October 13-15, 2003, Proceedings |
ESORICS |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Andrei Serjantov, Peter Sewell |
Passive Attack Analysis for Connection-Based Anonymity Systems. |
ESORICS |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Michael Backes 0001, Birgit Pfitzmann, Matthias Schunter |
A Toolkit for Managing Enterprise Privacy Policies. |
ESORICS |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Dulce Domingos, António Rito Silva, Pedro Veiga |
Authorization and Access Control in Adaptive Workflows. |
ESORICS |
2003 |
DBLP DOI BibTeX RDF |
adaptive authorizations, Access control, adaptive workflow |
1 | Adrian Baldwin, Simon Shiu |
Hardware Encapsulation of Security Services. |
ESORICS |
2003 |
DBLP DOI BibTeX RDF |
|