The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ESORICS"( http://dblp.L3S.de/Venues/ESORICS )

URL (DBLP): http://dblp.uni-trier.de/db/conf/esorics

Publication years (Num. hits)
1990 (25) 1992 (25) 1994 (27) 1996 (24) 1998 (25) 2000 (20) 2002 (17) 2003 (20) 2004 (28) 2005 (29) 2006 (33) 2007 (41) 2008 (38) 2009 (43) 2010 (43) 2011 (37) 2012 (51) 2013 (44)
Publication types (Num. hits)
inproceedings(552) proceedings(18)
Venues (Conferences, Journals, ...)
ESORICS(570)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 311 occurrences of 214 keywords

Results
Found 570 publication records. Showing 570 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Elisa Bertino, Elena Ferrari, Loredana Parasiliti Provenza Signature and Access Control Policies for XML Documents. Search on Bibsonomy ESORICS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1David A. Basin, Sebastian Mödersheim, Luca Viganò 0001 An On-the-Fly Model-Checker for Security Protocol Analysis. Search on Bibsonomy ESORICS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Jacob Zimmermann, Ludovic Mé, Christophe Bidan An Improved Reference Flow Control Model for Policy-Based Intrusion Detection. Search on Bibsonomy ESORICS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Policy-based intrusion detection, access control, information flow control
1Helmut Scherzer, Ran Canetti, Paul A. Karger, Hugo Krawczyk, Tal Rabin, David C. Toll Authenticating Mandatory Access Controls and Preserving Privacy for a High-Assurance Smart Card. Search on Bibsonomy ESORICS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Marco Casassa Mont, Siani Pearson, Pete Bramhall Towards Accountable Management of Privacy and Identity Information. Search on Bibsonomy ESORICS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Michael Backes 0001, Birgit Pfitzmann, Michael Waidner Symmetric Authentication within a Simulatable Cryptographic Library. Search on Bibsonomy ESORICS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Dennis Hofheinz, Jörn Müller-Quade, Rainer Steinwandt Initiator-Resilient Universally Composable Key Exchange. Search on Bibsonomy ESORICS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF formal cryptography, universalcomposition, cryptographic protocols, key exchange
1Marcin Gomulkiewicz, Miroslaw Kutylowski Hamming Weight Attacks on Cryptographic Hardware - Breaking Masking Defense. Search on Bibsonomy ESORICS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF power analysis, side channel cryptanalysis, Hamming weight, cryptographic hardware
1Thomas Santen, Maritta Heisel, Andreas Pfitzmann Confidentiality-Preserving Refinement is Compositional - Sometimes. Search on Bibsonomy ESORICS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Sean W. Smith Outbound Authentication for Programmable Secure Coprocessors. Search on Bibsonomy ESORICS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Giles Hogben, Tom Jackson, Marc Wilikens A Fully Compliant Research Implementation of the P3P Standard for Privacy Protection: Experiences and Recommendations. Search on Bibsonomy ESORICS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF XML Digital Signatures, P3P, transaction management, privacy enhancing technologies, security verification, secure electronic commerce
1Lingyu Wang 0001, Duminda Wijesekera, Sushil Jajodia Cardinality-Based Inference Control in Sum-Only Data Cubes. Search on Bibsonomy ESORICS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Joachim Biskup, Piero A. Bonatti Confidentiality Policies and Their Enforcement for Controlled Query Evaluation. Search on Bibsonomy ESORICS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Potential secret, Combined refusal and lying, Policy, Confidentiality, Inference control, Secrecy, Lying, Refusal, Controlled query evaluation
1Aloysius K. Mok, Weijiang Yu TINMAN: A Resource Bound Security Checking System for Mobile Code. Search on Bibsonomy ESORICS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Michael Backes 0001, Birgit Pfitzmann Computational Probabilistic Non-interference. Search on Bibsonomy ESORICS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1James Heather, Steve A. Schneider Equal To The Task? Search on Bibsonomy ESORICS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF inequality tests, formal methods in security, RSA, cryptographic protocols, security models, rank functions, data independence, security verification, strand spaces
1Manuel Koch, Luigi V. Mancini, Francesco Parisi-Presicce Decidability of Safety in Graph-Based Models for Access Control. Search on Bibsonomy ESORICS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Philippa J. Broadfoot, Gavin Lowe Analysing a Stream Authentication Protocol Using Model Checking. Search on Bibsonomy ESORICS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1David von Oheimb, Volkmar Lotz Formal Security Analysis with Interacting State Machines. Search on Bibsonomy ESORICS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1James Giles, Reiner Sailer, Dinesh C. Verma, Suresh Chari Authentication for Distributed Web Caches. Search on Bibsonomy ESORICS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Security, Authentication, Distributed Applications, CDN, Cookies
1Dieter Gollmann, Günter Karjoth, Michael Waidner (eds.) Computer Security - ESORICS 2002, 7th European Symposium on Research in Computer Security, Zurich, Switzerland, October 14-16, 2002, Proceedings Search on Bibsonomy ESORICS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Xinyuan Wang 0005, Douglas S. Reeves, Shyhtsun Felix Wu Inter-Packet Delay Based Correlation for Tracing Encrypted Connections through Stepping Stones. Search on Bibsonomy ESORICS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Kaoru Kurosawa, Wakaha Ogata Bit-Slice Auction Circuit. Search on Bibsonomy ESORICS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF mix and match, auction, circuit, bit-slice, multiparty protocol
1Sin Yeung Lee, Wai Lup Low, Pei Yuen Wong Learning Fingerprints for a Database Intrusion Detection System. Search on Bibsonomy ESORICS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Jon Howell, David Kotz A Formal Semantics for SPKI. Search on Bibsonomy ESORICS The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Kai Rannenberg How Much Negotiation and Detail Can Users Handle? Experiences with Security Negotiation and the Granularity of Access Control in Communications. Search on Bibsonomy ESORICS The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Giampaolo Bella, Fabio Massacci, Lawrence C. Paulson, Piero Tramontano Formal Verification of Cardholder Registration in SET. Search on Bibsonomy ESORICS The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Refik Molva, Yves Roudier A Distributed Access Control Model for Java. Search on Bibsonomy ESORICS The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Java, distribution, capabilities, access control model, SPKI
1Kunikazu Yoda, Hiroaki Etoh Finding a Connection Chain for Tracing Intruders. Search on Bibsonomy ESORICS The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Gerald Brose A Typed Access Control Model for CORBA. Search on Bibsonomy ESORICS The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Access control, CORBA, types, roles
1Ciarán Bryce A Security Framework for a Mobile Agent System. Search on Bibsonomy ESORICS The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Barbara Masucci, Douglas R. Stinson Metering Schemes for General Access Structures. Search on Bibsonomy ESORICS The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Distributed Audit, Security, Cryptography, Entropy, Metering
1Els Van Herreweghen Secure Anonymous Signature-Based Transactions. Search on Bibsonomy ESORICS The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Heiko Mantel Unwinding Possibilistic Security Properties. Search on Bibsonomy ESORICS The full citation details ... 2000 DBLP  DOI  BibTeX  RDF unwinding, refinement, information flow, security models
1Masakazu Soshi Safety Analysis of the Dynamic-Typed Access Matrix Model. Search on Bibsonomy ESORICS The full citation details ... 2000 DBLP  DOI  BibTeX  RDF access matrix model, safety problem, computational complexity, access control, decidability
1Philippa J. Broadfoot, Gavin Lowe, A. W. Roscoe 0001 Automating Data Independence. Search on Bibsonomy ESORICS The full citation details ... 2000 DBLP  DOI  BibTeX  RDF model checking, security protocols, CSP, automatic verification, FDR, data independence, Casper
1Gerhard Schellhorn, Wolfgang Reif, Axel Schairer, Paul A. Karger, Vernon Austel, David C. Toll Verification of a Formal Security Model for Multiapplicative Smart Cards. Search on Bibsonomy ESORICS The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Frédéric Cuppens, Yves Deswarte, Dieter Gollmann, Michael Waidner (eds.) Computer Security - ESORICS 2000, 6th European Symposium on Research in Computer Security, Toulouse, France, October 4-6, 2000, Proceedings Search on Bibsonomy ESORICS The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Pierre Bieber, Jacques Cazin, Pierre Girard, Jean-Louis Lanet, Virginie Wiels, Guy Zanon Checking Secure Interactions of Smart Card Applets. Search on Bibsonomy ESORICS The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Joshua D. Guttman, Amy L. Herzog, F. Javier Thayer Authentication and Confidentiality via IPSEC. Search on Bibsonomy ESORICS The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Olivier Paul, Maryline Laurent, Sylvain Gombault A Full Bandwidth ATM Firewall. Search on Bibsonomy ESORICS The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Manuel Koch, Luigi V. Mancini, Francesco Parisi-Presicce A Formal Model for Role-Based Access Control Using Graph Transformation. Search on Bibsonomy ESORICS The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Ian Welch, Robert J. Stroud Using Reflection as a Mechanism for Enforcing Security Policies in Mobile Code. Search on Bibsonomy ESORICS The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Neil Evans, Steve A. Schneider Analysing Time Dependent Security Properties in CSP Using PVS. Search on Bibsonomy ESORICS The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Authentication Protocol Verification, Timed Behaviour, CSP, Automated Theorem Proving, PVS
1Angelos P. Varvitsiotis, Despina Polemi, Andy Marsh EUROMED-JAVA: Trusted Third Party Services for Securing Medical Java Applets. Search on Bibsonomy ESORICS The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Telemedical Applications, Trusted Third Party Services, EUROMED, EUROMED-ETS, Java, Web
1Daniel Augot, Jean-François Delaigle, Caroline Fontaine DHWM: A Scheme for Managing Watermarking Keys in the Aquarelle Multimedia Distributed System. Search on Bibsonomy ESORICS The full citation details ... 1998 DBLP  DOI  BibTeX  RDF IPR protection, Aquarelle, multimedia distributed system, watermarking, Key exchange
1Jean-Jacques Quisquater, Yves Deswarte, Catherine Meadows 0001, Dieter Gollmann (eds.) Computer Security - ESORICS 98, 5th European Symposium on Research in Computer Security, Louvain-la-Neuve, Belgium, September 16-18, 1998, Proceedings Search on Bibsonomy ESORICS The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Danilo Bruschi, Emilia Rosti, R. Banfi A Tool for Pro-active Defense Against the Buffer Overrun Attack. Search on Bibsonomy ESORICS The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Jean-Paul M. G. Linnartz, Joop Talstra MPEG PTY-Marks: Cheap Detection of Embedded Copyright Data in DVD-Video. Search on Bibsonomy ESORICS The full citation details ... 1998 DBLP  DOI  BibTeX  RDF DVD-video, Watermarking, MPEG, copy-protection
1Frédéric Cuppens, Alban Gabillon Rules for Designing Multilevel Object-Oriented Databases. Search on Bibsonomy ESORICS The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Lora Kassab, Steven J. Greenwald Towards Formalizing the Java Security Architecture of JDK 1.2. Search on Bibsonomy ESORICS The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Jean-Paul M. G. Linnartz The "Ticket" Concept for Copy Control Based on Embedded Signalling. Search on Bibsonomy ESORICS The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Protection of IPR, embedded signaling, copy control, copy once, playback control, Copy Generation Management System (CGMS), Digital Versatile Disc (DVD), watermarking
1Ross J. Anderson On the Security of Digital Tachographs. Search on Bibsonomy ESORICS The full citation details ... 1998 DBLP  DOI  BibTeX  RDF tachographs, smartcard, fraud, tampering
1Günther Horn, Bart Preneel Authentication and Payment in Future Mobile Systems. Search on Bibsonomy ESORICS The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Audun Jøsang A Subjective Metric of Authentication. Search on Bibsonomy ESORICS The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Volker Kessler, Heike Neumann A Sound Logic for Analysing Electronic Commerce Protocols. Search on Bibsonomy ESORICS The full citation details ... 1998 DBLP  DOI  BibTeX  RDF logic of authentication, Payword, semantics, Electronic commerce, formal analysis, SET, micropayment
1Hervé Debar, Marc Dacier, Mehdi Nassehi, Andreas Wespi Fixed vs. Variable-Length Patterns for Detecting Suspicious Process Behavior. Search on Bibsonomy ESORICS The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Elisa Bertino, Francesco Buccafurri, Elena Ferrari, Pasquale Rullo An Authorization Model and Its Formal Semantics. Search on Bibsonomy ESORICS The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Elke Franz 0001, Anja Jerichow A Mix-Mediated Anonymity Service and Its Payment. Search on Bibsonomy ESORICS The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Rodolphe Ortalo A Flexible Method for Information System Security Policy Specification. Search on Bibsonomy ESORICS The full citation details ... 1998 DBLP  DOI  BibTeX  RDF information systems, deontic logic, security policy specification
1Joachim Posegga, Harald Vogt Byte Code Verification for Java Smart Card Based on Model Checking. Search on Bibsonomy ESORICS The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Christophe Bidan, Valérie Issarny Dealing with Multi-policy Security in Large Open Distributed Systems. Search on Bibsonomy ESORICS The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Gérard Eizenberg, Jean-Jacques Quisquater Panel Session: Watermarking. Search on Bibsonomy ESORICS The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1John Kelsey, Bruce Schneier, David A. Wagner 0001, Chris Hall Side Channel Cryptanalysis of Product Ciphers. Search on Bibsonomy ESORICS The full citation details ... 1998 DBLP  DOI  BibTeX  RDF product ciphers, cryptanalysis, timing attacks, side channels
1Simon N. Foley A Kernelized Architecture for Multilevel Secure Application Policies. Search on Bibsonomy ESORICS The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Günter Karjoth Authorization in CORBA Security. Search on Bibsonomy ESORICS The full citation details ... 1998 DBLP  DOI  BibTeX  RDF object access control, CORBA, authorization, distributed object systems
1Dogan Kesdogan, Peter Reichl, Klaus Junghärtchen Distributed Temporary Pseudonyms: A New Approach for Protecting Location Information in Mobile Communication Networks. Search on Bibsonomy ESORICS The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Giampaolo Bella, Lawrence C. Paulson Kerberos Version 4: Inductive Analysis of the Secrecy Goals. Search on Bibsonomy ESORICS The full citation details ... 1998 DBLP  DOI  BibTeX  RDF secure key, non-expired timestamp, inductive method, machine proof, secrecy
1Markus Michels, Markus Stadler, Hung-Min Sun On the Security of Some Variants of the RSA Signature Scheme. Search on Bibsonomy ESORICS The full citation details ... 1998 DBLP  DOI  BibTeX  RDF RSA variants, cryptanalysis, digital signature schemes
1Donald G. Marks, Amihai Motro, Sushil Jajodia Enhancing the Controlled Disclosure of Sensitive Information. Search on Bibsonomy ESORICS The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
1Steve A. Schneider, Abraham Sidiropoulos CSP and Anonymity. Search on Bibsonomy ESORICS The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
1Jianying Zhou 0001, Dieter Gollmann Certified Electronic Mail. Search on Bibsonomy ESORICS The full citation details ... 1996 DBLP  DOI  BibTeX  RDF certified electronic mail, protocol design, communications security
1Gérard Eizenberg, Dominique Gonthier, Alistair Kelman, Jean-Jacques Quisquater Authors' Rights and Copyright Protection. Search on Bibsonomy ESORICS The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
1Wenbo Mao Light-Weight Micro-cash Payment for the Internet. Search on Bibsonomy ESORICS The full citation details ... 1996 DBLP  DOI  BibTeX  RDF Revocable cash for double spender, Internet electronic commerce
1N. Asokan, Gene Tsudik, Michael Waidner Server-Supported Signatures. Search on Bibsonomy ESORICS The full citation details ... 1996 DBLP  DOI  BibTeX  RDF distributed systems, mobility, network security, electronic commerce, digital signatures, non-repudiation
1Ravi S. Sandhu Role Hierarchies and Constraints for Lattice-Based Access Controls. Search on Bibsonomy ESORICS The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
1William M. Farmer, Joshua D. Guttman, Vipin Swarup Security for Mobile Agents: Authentication and State Appraisal. Search on Bibsonomy ESORICS The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
1Shyhtsun Felix Wu Sleepy Network-Layer Authentication Service for IPSEC. Search on Bibsonomy ESORICS The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
1Stefano Zatti, Refik Molva, Angelo Tosi, Gene Tsudik, Helmut Kurth Limitations of the Approach of Solving a Network's Security Problem with a Firewall. Search on Bibsonomy ESORICS The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
1Sabrina De Capitani di Vimercati, Pierangela Samarati An Authorization Model for Federated Systems. Search on Bibsonomy ESORICS The full citation details ... 1996 DBLP  DOI  BibTeX  RDF authorization administration, authorization autonomy, access control, Federated systems
1Jan Camenisch, Ueli M. Maurer, Markus Stadler Digital Payment Systems with Passive Anonymity-Revoking Trustees. Search on Bibsonomy ESORICS The full citation details ... 1996 DBLP  DOI  BibTeX  RDF Digital payment systems, privacy, cryptography, anonymity revocation, electronic money
1Vincent Nicomette, Yves Deswarte A Multilevel Security Model for Distributed Object Systems. Search on Bibsonomy ESORICS The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
1Elisa Bertino, Helmut Kurth, Giancarlo Martella, Emilio Montolivo (eds.) Computer Security - ESORICS 96, 4th European Symposium on Research in Computer Security, Rome, Italy, September 25-27, 1996, Proceedings Search on Bibsonomy ESORICS The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
1Ueli M. Maurer Modelling a Public-Key Infrastructure. Search on Bibsonomy ESORICS The full citation details ... 1996 DBLP  DOI  BibTeX  RDF cryptography, trust, recommendations, key management, probabilistic logic, Distributed system security, public-key certification
1Bruce Schneier, John Kelsey, Jay Walker Distributed Proctoring. Search on Bibsonomy ESORICS The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
1Luigi V. Mancini, Indrajit Ray Secure Concurrency Control in MLS Databases with Two Versions of Data. Search on Bibsonomy ESORICS The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
1Catherine A. Meadows Analyzing the Needham-Schroeder Public-Key Protocol: A Comparison of Two Approaches. Search on Bibsonomy ESORICS The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
1Andrew Warner, Qiang Li, Thomas F. Keefe, Shankar Pal The Impact of Multilevel Security on Database Buffer Management. Search on Bibsonomy ESORICS The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
1Vijayalakshmi Atluri, Wei-kuang Huang An Authorization Model for Workflows. Search on Bibsonomy ESORICS The full citation details ... 1996 DBLP  DOI  BibTeX  RDF Security, Petri nets, Workflow, Authorization
1Piero A. Bonatti, Maria Luisa Sapino, V. S. Subrahmanian Merging Heterogeneous Security Orderings. Search on Bibsonomy ESORICS The full citation details ... 1996 DBLP  DOI  BibTeX  RDF Theoretical Foundations of Security, Heterogeneous Mediated/Federated Systems
1Gabriele Wedel, Volker Kessler Formal Semantics for Authentication Logics. Search on Bibsonomy ESORICS The full citation details ... 1996 DBLP  DOI  BibTeX  RDF logic of authentication, Formal verification, key management, cryptographic protocols
1Michael Waidner Development of a Secure Electronic Marketplace for Europe. Search on Bibsonomy ESORICS The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
1Volkmar Lotz Threat Scenarios as a Means to Formally Develop Secure Systems. Search on Bibsonomy ESORICS The full citation details ... 1996 DBLP  DOI  BibTeX  RDF Threat Identification, Stream Processing Functions, Security, Authentication, Formal Methods, Protocols, Risk Analysis
1Nora Boulahia-Cuppens, Frédéric Cuppens, Alban Gabillon, Kioumars Yazdanian Decomposition of Multilevel Objects in an Object-Oriented Database. Search on Bibsonomy ESORICS The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1Frédéric Cuppens, Gilles Trouessin Information Flow Controls vs Interference Controls: An Integrated Approach. Search on Bibsonomy ESORICS The full citation details ... 1994 DBLP  DOI  BibTeX  RDF Modal logic, Security model, Database security, Information flow control, Inference control
1Vasilios Zorkadis Security Versus Performance Requirements in Data Communications Systems. Search on Bibsonomy ESORICS The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1Ross J. Anderson Liability and Computer Security: Nine Principles. Search on Bibsonomy ESORICS The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1Marc Dacier, Yves Deswarte Privilege Graph: an Extension to the Typed Access Matrix Model. Search on Bibsonomy ESORICS The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1Colin Boyd, Wenbo Mao Designing Secure Key Exchange Protocols. Search on Bibsonomy ESORICS The full citation details ... 1994 DBLP  DOI  BibTeX  RDF authentication, key management, Cryptographic protocols
1Azad Jiwa, Jennifer Seberry, Yuliang Zheng 0001 Beacon Based Authentication. Search on Bibsonomy ESORICS The full citation details ... 1994 DBLP  DOI  BibTeX  RDF Term Index Beacon, Authentication, Network Security, Information Security, Security Protocol
Displaying result #401 - #500 of 570 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license