Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Elisa Bertino, Elena Ferrari, Loredana Parasiliti Provenza |
Signature and Access Control Policies for XML Documents. |
ESORICS |
2003 |
DBLP DOI BibTeX RDF |
|
1 | David A. Basin, Sebastian Mödersheim, Luca Viganò 0001 |
An On-the-Fly Model-Checker for Security Protocol Analysis. |
ESORICS |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Jacob Zimmermann, Ludovic Mé, Christophe Bidan |
An Improved Reference Flow Control Model for Policy-Based Intrusion Detection. |
ESORICS |
2003 |
DBLP DOI BibTeX RDF |
Policy-based intrusion detection, access control, information flow control |
1 | Helmut Scherzer, Ran Canetti, Paul A. Karger, Hugo Krawczyk, Tal Rabin, David C. Toll |
Authenticating Mandatory Access Controls and Preserving Privacy for a High-Assurance Smart Card. |
ESORICS |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Marco Casassa Mont, Siani Pearson, Pete Bramhall |
Towards Accountable Management of Privacy and Identity Information. |
ESORICS |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Michael Backes 0001, Birgit Pfitzmann, Michael Waidner |
Symmetric Authentication within a Simulatable Cryptographic Library. |
ESORICS |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Dennis Hofheinz, Jörn Müller-Quade, Rainer Steinwandt |
Initiator-Resilient Universally Composable Key Exchange. |
ESORICS |
2003 |
DBLP DOI BibTeX RDF |
formal cryptography, universalcomposition, cryptographic protocols, key exchange |
1 | Marcin Gomulkiewicz, Miroslaw Kutylowski |
Hamming Weight Attacks on Cryptographic Hardware - Breaking Masking Defense. |
ESORICS |
2002 |
DBLP DOI BibTeX RDF |
power analysis, side channel cryptanalysis, Hamming weight, cryptographic hardware |
1 | Thomas Santen, Maritta Heisel, Andreas Pfitzmann |
Confidentiality-Preserving Refinement is Compositional - Sometimes. |
ESORICS |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Sean W. Smith |
Outbound Authentication for Programmable Secure Coprocessors. |
ESORICS |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Giles Hogben, Tom Jackson, Marc Wilikens |
A Fully Compliant Research Implementation of the P3P Standard for Privacy Protection: Experiences and Recommendations. |
ESORICS |
2002 |
DBLP DOI BibTeX RDF |
XML Digital Signatures, P3P, transaction management, privacy enhancing technologies, security verification, secure electronic commerce |
1 | Lingyu Wang 0001, Duminda Wijesekera, Sushil Jajodia |
Cardinality-Based Inference Control in Sum-Only Data Cubes. |
ESORICS |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Joachim Biskup, Piero A. Bonatti |
Confidentiality Policies and Their Enforcement for Controlled Query Evaluation. |
ESORICS |
2002 |
DBLP DOI BibTeX RDF |
Potential secret, Combined refusal and lying, Policy, Confidentiality, Inference control, Secrecy, Lying, Refusal, Controlled query evaluation |
1 | Aloysius K. Mok, Weijiang Yu |
TINMAN: A Resource Bound Security Checking System for Mobile Code. |
ESORICS |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Michael Backes 0001, Birgit Pfitzmann |
Computational Probabilistic Non-interference. |
ESORICS |
2002 |
DBLP DOI BibTeX RDF |
|
1 | James Heather, Steve A. Schneider |
Equal To The Task? |
ESORICS |
2002 |
DBLP DOI BibTeX RDF |
inequality tests, formal methods in security, RSA, cryptographic protocols, security models, rank functions, data independence, security verification, strand spaces |
1 | Manuel Koch, Luigi V. Mancini, Francesco Parisi-Presicce |
Decidability of Safety in Graph-Based Models for Access Control. |
ESORICS |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Philippa J. Broadfoot, Gavin Lowe |
Analysing a Stream Authentication Protocol Using Model Checking. |
ESORICS |
2002 |
DBLP DOI BibTeX RDF |
|
1 | David von Oheimb, Volkmar Lotz |
Formal Security Analysis with Interacting State Machines. |
ESORICS |
2002 |
DBLP DOI BibTeX RDF |
|
1 | James Giles, Reiner Sailer, Dinesh C. Verma, Suresh Chari |
Authentication for Distributed Web Caches. |
ESORICS |
2002 |
DBLP DOI BibTeX RDF |
Security, Authentication, Distributed Applications, CDN, Cookies |
1 | Dieter Gollmann, Günter Karjoth, Michael Waidner (eds.) |
Computer Security - ESORICS 2002, 7th European Symposium on Research in Computer Security, Zurich, Switzerland, October 14-16, 2002, Proceedings |
ESORICS |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Xinyuan Wang 0005, Douglas S. Reeves, Shyhtsun Felix Wu |
Inter-Packet Delay Based Correlation for Tracing Encrypted Connections through Stepping Stones. |
ESORICS |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Kaoru Kurosawa, Wakaha Ogata |
Bit-Slice Auction Circuit. |
ESORICS |
2002 |
DBLP DOI BibTeX RDF |
mix and match, auction, circuit, bit-slice, multiparty protocol |
1 | Sin Yeung Lee, Wai Lup Low, Pei Yuen Wong |
Learning Fingerprints for a Database Intrusion Detection System. |
ESORICS |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Jon Howell, David Kotz |
A Formal Semantics for SPKI. |
ESORICS |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Kai Rannenberg |
How Much Negotiation and Detail Can Users Handle? Experiences with Security Negotiation and the Granularity of Access Control in Communications. |
ESORICS |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Giampaolo Bella, Fabio Massacci, Lawrence C. Paulson, Piero Tramontano |
Formal Verification of Cardholder Registration in SET. |
ESORICS |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Refik Molva, Yves Roudier |
A Distributed Access Control Model for Java. |
ESORICS |
2000 |
DBLP DOI BibTeX RDF |
Java, distribution, capabilities, access control model, SPKI |
1 | Kunikazu Yoda, Hiroaki Etoh |
Finding a Connection Chain for Tracing Intruders. |
ESORICS |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Gerald Brose |
A Typed Access Control Model for CORBA. |
ESORICS |
2000 |
DBLP DOI BibTeX RDF |
Access control, CORBA, types, roles |
1 | Ciarán Bryce |
A Security Framework for a Mobile Agent System. |
ESORICS |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Barbara Masucci, Douglas R. Stinson |
Metering Schemes for General Access Structures. |
ESORICS |
2000 |
DBLP DOI BibTeX RDF |
Distributed Audit, Security, Cryptography, Entropy, Metering |
1 | Els Van Herreweghen |
Secure Anonymous Signature-Based Transactions. |
ESORICS |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Heiko Mantel |
Unwinding Possibilistic Security Properties. |
ESORICS |
2000 |
DBLP DOI BibTeX RDF |
unwinding, refinement, information flow, security models |
1 | Masakazu Soshi |
Safety Analysis of the Dynamic-Typed Access Matrix Model. |
ESORICS |
2000 |
DBLP DOI BibTeX RDF |
access matrix model, safety problem, computational complexity, access control, decidability |
1 | Philippa J. Broadfoot, Gavin Lowe, A. W. Roscoe 0001 |
Automating Data Independence. |
ESORICS |
2000 |
DBLP DOI BibTeX RDF |
model checking, security protocols, CSP, automatic verification, FDR, data independence, Casper |
1 | Gerhard Schellhorn, Wolfgang Reif, Axel Schairer, Paul A. Karger, Vernon Austel, David C. Toll |
Verification of a Formal Security Model for Multiapplicative Smart Cards. |
ESORICS |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Frédéric Cuppens, Yves Deswarte, Dieter Gollmann, Michael Waidner (eds.) |
Computer Security - ESORICS 2000, 6th European Symposium on Research in Computer Security, Toulouse, France, October 4-6, 2000, Proceedings |
ESORICS |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Pierre Bieber, Jacques Cazin, Pierre Girard, Jean-Louis Lanet, Virginie Wiels, Guy Zanon |
Checking Secure Interactions of Smart Card Applets. |
ESORICS |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Joshua D. Guttman, Amy L. Herzog, F. Javier Thayer |
Authentication and Confidentiality via IPSEC. |
ESORICS |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Olivier Paul, Maryline Laurent, Sylvain Gombault |
A Full Bandwidth ATM Firewall. |
ESORICS |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Manuel Koch, Luigi V. Mancini, Francesco Parisi-Presicce |
A Formal Model for Role-Based Access Control Using Graph Transformation. |
ESORICS |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Ian Welch, Robert J. Stroud |
Using Reflection as a Mechanism for Enforcing Security Policies in Mobile Code. |
ESORICS |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Neil Evans, Steve A. Schneider |
Analysing Time Dependent Security Properties in CSP Using PVS. |
ESORICS |
2000 |
DBLP DOI BibTeX RDF |
Authentication Protocol Verification, Timed Behaviour, CSP, Automated Theorem Proving, PVS |
1 | Angelos P. Varvitsiotis, Despina Polemi, Andy Marsh |
EUROMED-JAVA: Trusted Third Party Services for Securing Medical Java Applets. |
ESORICS |
1998 |
DBLP DOI BibTeX RDF |
Telemedical Applications, Trusted Third Party Services, EUROMED, EUROMED-ETS, Java, Web |
1 | Daniel Augot, Jean-François Delaigle, Caroline Fontaine |
DHWM: A Scheme for Managing Watermarking Keys in the Aquarelle Multimedia Distributed System. |
ESORICS |
1998 |
DBLP DOI BibTeX RDF |
IPR protection, Aquarelle, multimedia distributed system, watermarking, Key exchange |
1 | Jean-Jacques Quisquater, Yves Deswarte, Catherine Meadows 0001, Dieter Gollmann (eds.) |
Computer Security - ESORICS 98, 5th European Symposium on Research in Computer Security, Louvain-la-Neuve, Belgium, September 16-18, 1998, Proceedings |
ESORICS |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Danilo Bruschi, Emilia Rosti, R. Banfi |
A Tool for Pro-active Defense Against the Buffer Overrun Attack. |
ESORICS |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Jean-Paul M. G. Linnartz, Joop Talstra |
MPEG PTY-Marks: Cheap Detection of Embedded Copyright Data in DVD-Video. |
ESORICS |
1998 |
DBLP DOI BibTeX RDF |
DVD-video, Watermarking, MPEG, copy-protection |
1 | Frédéric Cuppens, Alban Gabillon |
Rules for Designing Multilevel Object-Oriented Databases. |
ESORICS |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Lora Kassab, Steven J. Greenwald |
Towards Formalizing the Java Security Architecture of JDK 1.2. |
ESORICS |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Jean-Paul M. G. Linnartz |
The "Ticket" Concept for Copy Control Based on Embedded Signalling. |
ESORICS |
1998 |
DBLP DOI BibTeX RDF |
Protection of IPR, embedded signaling, copy control, copy once, playback control, Copy Generation Management System (CGMS), Digital Versatile Disc (DVD), watermarking |
1 | Ross J. Anderson |
On the Security of Digital Tachographs. |
ESORICS |
1998 |
DBLP DOI BibTeX RDF |
tachographs, smartcard, fraud, tampering |
1 | Günther Horn, Bart Preneel |
Authentication and Payment in Future Mobile Systems. |
ESORICS |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Audun Jøsang |
A Subjective Metric of Authentication. |
ESORICS |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Volker Kessler, Heike Neumann |
A Sound Logic for Analysing Electronic Commerce Protocols. |
ESORICS |
1998 |
DBLP DOI BibTeX RDF |
logic of authentication, Payword, semantics, Electronic commerce, formal analysis, SET, micropayment |
1 | Hervé Debar, Marc Dacier, Mehdi Nassehi, Andreas Wespi |
Fixed vs. Variable-Length Patterns for Detecting Suspicious Process Behavior. |
ESORICS |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Elisa Bertino, Francesco Buccafurri, Elena Ferrari, Pasquale Rullo |
An Authorization Model and Its Formal Semantics. |
ESORICS |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Elke Franz 0001, Anja Jerichow |
A Mix-Mediated Anonymity Service and Its Payment. |
ESORICS |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Rodolphe Ortalo |
A Flexible Method for Information System Security Policy Specification. |
ESORICS |
1998 |
DBLP DOI BibTeX RDF |
information systems, deontic logic, security policy specification |
1 | Joachim Posegga, Harald Vogt |
Byte Code Verification for Java Smart Card Based on Model Checking. |
ESORICS |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Christophe Bidan, Valérie Issarny |
Dealing with Multi-policy Security in Large Open Distributed Systems. |
ESORICS |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Gérard Eizenberg, Jean-Jacques Quisquater |
Panel Session: Watermarking. |
ESORICS |
1998 |
DBLP DOI BibTeX RDF |
|
1 | John Kelsey, Bruce Schneier, David A. Wagner 0001, Chris Hall |
Side Channel Cryptanalysis of Product Ciphers. |
ESORICS |
1998 |
DBLP DOI BibTeX RDF |
product ciphers, cryptanalysis, timing attacks, side channels |
1 | Simon N. Foley |
A Kernelized Architecture for Multilevel Secure Application Policies. |
ESORICS |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Günter Karjoth |
Authorization in CORBA Security. |
ESORICS |
1998 |
DBLP DOI BibTeX RDF |
object access control, CORBA, authorization, distributed object systems |
1 | Dogan Kesdogan, Peter Reichl, Klaus Junghärtchen |
Distributed Temporary Pseudonyms: A New Approach for Protecting Location Information in Mobile Communication Networks. |
ESORICS |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Giampaolo Bella, Lawrence C. Paulson |
Kerberos Version 4: Inductive Analysis of the Secrecy Goals. |
ESORICS |
1998 |
DBLP DOI BibTeX RDF |
secure key, non-expired timestamp, inductive method, machine proof, secrecy |
1 | Markus Michels, Markus Stadler, Hung-Min Sun |
On the Security of Some Variants of the RSA Signature Scheme. |
ESORICS |
1998 |
DBLP DOI BibTeX RDF |
RSA variants, cryptanalysis, digital signature schemes |
1 | Donald G. Marks, Amihai Motro, Sushil Jajodia |
Enhancing the Controlled Disclosure of Sensitive Information. |
ESORICS |
1996 |
DBLP DOI BibTeX RDF |
|
1 | Steve A. Schneider, Abraham Sidiropoulos |
CSP and Anonymity. |
ESORICS |
1996 |
DBLP DOI BibTeX RDF |
|
1 | Jianying Zhou 0001, Dieter Gollmann |
Certified Electronic Mail. |
ESORICS |
1996 |
DBLP DOI BibTeX RDF |
certified electronic mail, protocol design, communications security |
1 | Gérard Eizenberg, Dominique Gonthier, Alistair Kelman, Jean-Jacques Quisquater |
Authors' Rights and Copyright Protection. |
ESORICS |
1996 |
DBLP DOI BibTeX RDF |
|
1 | Wenbo Mao |
Light-Weight Micro-cash Payment for the Internet. |
ESORICS |
1996 |
DBLP DOI BibTeX RDF |
Revocable cash for double spender, Internet electronic commerce |
1 | N. Asokan, Gene Tsudik, Michael Waidner |
Server-Supported Signatures. |
ESORICS |
1996 |
DBLP DOI BibTeX RDF |
distributed systems, mobility, network security, electronic commerce, digital signatures, non-repudiation |
1 | Ravi S. Sandhu |
Role Hierarchies and Constraints for Lattice-Based Access Controls. |
ESORICS |
1996 |
DBLP DOI BibTeX RDF |
|
1 | William M. Farmer, Joshua D. Guttman, Vipin Swarup |
Security for Mobile Agents: Authentication and State Appraisal. |
ESORICS |
1996 |
DBLP DOI BibTeX RDF |
|
1 | Shyhtsun Felix Wu |
Sleepy Network-Layer Authentication Service for IPSEC. |
ESORICS |
1996 |
DBLP DOI BibTeX RDF |
|
1 | Stefano Zatti, Refik Molva, Angelo Tosi, Gene Tsudik, Helmut Kurth |
Limitations of the Approach of Solving a Network's Security Problem with a Firewall. |
ESORICS |
1996 |
DBLP DOI BibTeX RDF |
|
1 | Sabrina De Capitani di Vimercati, Pierangela Samarati |
An Authorization Model for Federated Systems. |
ESORICS |
1996 |
DBLP DOI BibTeX RDF |
authorization administration, authorization autonomy, access control, Federated systems |
1 | Jan Camenisch, Ueli M. Maurer, Markus Stadler |
Digital Payment Systems with Passive Anonymity-Revoking Trustees. |
ESORICS |
1996 |
DBLP DOI BibTeX RDF |
Digital payment systems, privacy, cryptography, anonymity revocation, electronic money |
1 | Vincent Nicomette, Yves Deswarte |
A Multilevel Security Model for Distributed Object Systems. |
ESORICS |
1996 |
DBLP DOI BibTeX RDF |
|
1 | Elisa Bertino, Helmut Kurth, Giancarlo Martella, Emilio Montolivo (eds.) |
Computer Security - ESORICS 96, 4th European Symposium on Research in Computer Security, Rome, Italy, September 25-27, 1996, Proceedings |
ESORICS |
1996 |
DBLP DOI BibTeX RDF |
|
1 | Ueli M. Maurer |
Modelling a Public-Key Infrastructure. |
ESORICS |
1996 |
DBLP DOI BibTeX RDF |
cryptography, trust, recommendations, key management, probabilistic logic, Distributed system security, public-key certification |
1 | Bruce Schneier, John Kelsey, Jay Walker |
Distributed Proctoring. |
ESORICS |
1996 |
DBLP DOI BibTeX RDF |
|
1 | Luigi V. Mancini, Indrajit Ray |
Secure Concurrency Control in MLS Databases with Two Versions of Data. |
ESORICS |
1996 |
DBLP DOI BibTeX RDF |
|
1 | Catherine A. Meadows |
Analyzing the Needham-Schroeder Public-Key Protocol: A Comparison of Two Approaches. |
ESORICS |
1996 |
DBLP DOI BibTeX RDF |
|
1 | Andrew Warner, Qiang Li, Thomas F. Keefe, Shankar Pal |
The Impact of Multilevel Security on Database Buffer Management. |
ESORICS |
1996 |
DBLP DOI BibTeX RDF |
|
1 | Vijayalakshmi Atluri, Wei-kuang Huang |
An Authorization Model for Workflows. |
ESORICS |
1996 |
DBLP DOI BibTeX RDF |
Security, Petri nets, Workflow, Authorization |
1 | Piero A. Bonatti, Maria Luisa Sapino, V. S. Subrahmanian |
Merging Heterogeneous Security Orderings. |
ESORICS |
1996 |
DBLP DOI BibTeX RDF |
Theoretical Foundations of Security, Heterogeneous Mediated/Federated Systems |
1 | Gabriele Wedel, Volker Kessler |
Formal Semantics for Authentication Logics. |
ESORICS |
1996 |
DBLP DOI BibTeX RDF |
logic of authentication, Formal verification, key management, cryptographic protocols |
1 | Michael Waidner |
Development of a Secure Electronic Marketplace for Europe. |
ESORICS |
1996 |
DBLP DOI BibTeX RDF |
|
1 | Volkmar Lotz |
Threat Scenarios as a Means to Formally Develop Secure Systems. |
ESORICS |
1996 |
DBLP DOI BibTeX RDF |
Threat Identification, Stream Processing Functions, Security, Authentication, Formal Methods, Protocols, Risk Analysis |
1 | Nora Boulahia-Cuppens, Frédéric Cuppens, Alban Gabillon, Kioumars Yazdanian |
Decomposition of Multilevel Objects in an Object-Oriented Database. |
ESORICS |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Frédéric Cuppens, Gilles Trouessin |
Information Flow Controls vs Interference Controls: An Integrated Approach. |
ESORICS |
1994 |
DBLP DOI BibTeX RDF |
Modal logic, Security model, Database security, Information flow control, Inference control |
1 | Vasilios Zorkadis |
Security Versus Performance Requirements in Data Communications Systems. |
ESORICS |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Ross J. Anderson |
Liability and Computer Security: Nine Principles. |
ESORICS |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Marc Dacier, Yves Deswarte |
Privilege Graph: an Extension to the Typed Access Matrix Model. |
ESORICS |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Colin Boyd, Wenbo Mao |
Designing Secure Key Exchange Protocols. |
ESORICS |
1994 |
DBLP DOI BibTeX RDF |
authentication, key management, Cryptographic protocols |
1 | Azad Jiwa, Jennifer Seberry, Yuliang Zheng 0001 |
Beacon Based Authentication. |
ESORICS |
1994 |
DBLP DOI BibTeX RDF |
Term Index Beacon, Authentication, Network Security, Information Security, Security Protocol |