The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ESORICS"( http://dblp.L3S.de/Venues/ESORICS )

URL (DBLP): http://dblp.uni-trier.de/db/conf/esorics

Publication years (Num. hits)
1990 (25) 1992 (25) 1994 (27) 1996 (24) 1998 (25) 2000 (20) 2002 (17) 2003 (20) 2004 (28) 2005 (29) 2006 (33) 2007 (41) 2008 (38) 2009 (43) 2010 (43) 2011 (37) 2012 (51) 2013 (44)
Publication types (Num. hits)
inproceedings(552) proceedings(18)
Venues (Conferences, Journals, ...)
ESORICS(570)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 311 occurrences of 214 keywords

Results
Found 570 publication records. Showing 570 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Amihai Motro, Donald G. Marks, Sushil Jajodia Aggregation in Relational Databases: Controlled Disclosure of Sensitive Information. Search on Bibsonomy ESORICS The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1Ueli M. Maurer, Pierre E. Schmid A Calculus for Secure Channel Establishment in Open Networks. Search on Bibsonomy ESORICS The full citation details ... 1994 DBLP  DOI  BibTeX  RDF Security transformations, Cryptography, Network security, Key management, Formal models
1C. L. Robinson, Simon R. Wiseman A Consideration of the Modes of Operation for Secure Systems. Search on Bibsonomy ESORICS The full citation details ... 1994 DBLP  DOI  BibTeX  RDF Security Mode of Operation, Dedicated, System High, Compartmented, System Model, Z Notation, Multi-Level
1Jan Camenisch, Jean-Marc Piveteau, Markus Stadler An Efficient Electronic Payment System Protecting Privacy. Search on Bibsonomy ESORICS The full citation details ... 1994 DBLP  DOI  BibTeX  RDF privacy, cryptography, electronic payment systems
1Jean-Pierre Banâtre, Ciarán Bryce, Daniel Le Métayer Compile-Time Detection of Information Flow in Sequential Programs. Search on Bibsonomy ESORICS The full citation details ... 1994 DBLP  DOI  BibTeX  RDF formal verification, program analysis, computer security, information flow, verification tools
1Pierre Siron, Bruno d'Ausbourg A Secure Medium Access Control Protocol: Security vs Performances. Search on Bibsonomy ESORICS The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1Ralf C. Hauser, Philippe A. Janson, Refik Molva, Gene Tsudik, Els Van Herreweghen Robust and Secure Password and Key Change Method. Search on Bibsonomy ESORICS The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1Bruno d'Ausbourg Implementing Secure Dependencies over a Network by Designing a Distributed Security SubSystem. Search on Bibsonomy ESORICS The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1Christel Calas Distributed File System over a Multilevel Secure Architecture - Problems and Solutions. Search on Bibsonomy ESORICS The full citation details ... 1994 DBLP  DOI  BibTeX  RDF M2S machine, secure LAN, Security, Distributed file system, Multilevel security
1A. W. Roscoe 0001, Jim Woodcock 0001, Lars Wulf Non-Interference Through Determinism. Search on Bibsonomy ESORICS The full citation details ... 1994 DBLP  DOI  BibTeX  RDF Security, Formal methods, Process algebra, Determinism, Automatic verification, Non-interference
1Roshan K. Thomas, Ravi S. Sandhu Supporting Object-Based High-Assurance Write-up in Multilevel Databases for the Replicated Architecture. Search on Bibsonomy ESORICS The full citation details ... 1994 DBLP  DOI  BibTeX  RDF Replicated architecture, writeup, serial correctness, signaling channels, object-oriented databases, message-filtering
1Thomas Hardjono, Jennifer Seberry Authentication via Multi-Service Tickets in the Kuperee Server. Search on Bibsonomy ESORICS The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1Alessandro Ciampichetti, Elisa Bertino, Luigi V. Mancini Mark-and-Sweep Garbage Collection in Multilevel Secure Object-Oriented Database Systems. Search on Bibsonomy ESORICS The full citation details ... 1994 DBLP  DOI  BibTeX  RDF object deletion, mark-and-sweep, garbage collection, mandatory access control, object-oriented database systems
1Wenbo Mao, Colin Boyd On Strengthening Authentication Protocols to Foil Cryptanalysis. Search on Bibsonomy ESORICS The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1Jean-Paul Boly, Antoon Bosselaers, Ronald Cramer, Rolf Michelsen, Stig Fr. Mjølsnes, Frank Muller, Torben P. Pedersen, Birgit Pfitzmann, Peter de Rooij, Berry Schoenmakers, Matthias Schunter, Luc Vallée, Michael Waidner The ESPRIT Project CAFE - High Security Digital Payment Systems. Search on Bibsonomy ESORICS The full citation details ... 1994 DBLP  DOI  BibTeX  RDF Security in Applications (Financial) - Security Versus other Requirements (Performance, Fault Tolerance)
1Dieter Gollmann (eds.) Computer Security - ESORICS 94, Third European Symposium on Research in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings Search on Bibsonomy ESORICS The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1Lidong Chen Oblivious Signatures. Search on Bibsonomy ESORICS The full citation details ... 1994 DBLP  DOI  BibTeX  RDF oblivious signatures
1Colin O'Halloran, Chris T. Sennett Security Through Type Analysis. Search on Bibsonomy ESORICS The full citation details ... 1994 DBLP  DOI  BibTeX  RDF secure computer systems, Types, formal techniques, security evaluation
1Thomas Beth, Malte Borcherding, Birgit Klein Valuation of Trust in Open Networks. Search on Bibsonomy ESORICS The full citation details ... 1994 DBLP  DOI  BibTeX  RDF Trust values, Trust measures, Distributed systems
1Ravi S. Sandhu, Srinivas Ganta On the Expressive Power of the Unary Transformation Model. Search on Bibsonomy ESORICS The full citation details ... 1994 DBLP  DOI  BibTeX  RDF Access Control, Authorization, Expressive Power, Client-Server Architecture, Access Rights
1Yves Deswarte, Gérard Eizenberg, Jean-Jacques Quisquater (eds.) Computer Security - ESORICS 92, Second European Symposium on Research in Computer Security, Toulouse, France, November 23-25, 1992, Proceedings Search on Bibsonomy ESORICS The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
1Jean-Charles Fabre, Brian Randell An Object-Oriented View of Fragmented Data Processing for Fault and Intrusion Tolerance in Distributed Systems. Search on Bibsonomy ESORICS The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
1Colin Boyd A Formal Framework for Authentication. Search on Bibsonomy ESORICS The full citation details ... 1992 DBLP  DOI  BibTeX  RDF security standards, formal models, Authentication protocols
1Michael Wang, Andrzej M. Goscinski The Development and Testing of the Identity-Based Conference Key Distribution System for the RHODOS Distributed System. Search on Bibsonomy ESORICS The full citation details ... 1992 DBLP  DOI  BibTeX  RDF Identity-based Conference Key Distribution, Distributed Systems, Authentication, Distributed Operating Systems
1Joan Daemen, René Govaerts, Joos Vandewalle A Hardware Design Model for Cryptographic Algorithms. Search on Bibsonomy ESORICS The full citation details ... 1992 DBLP  DOI  BibTeX  RDF Hardware Cryptography, Pseudorandom Sequence Generators, Stream Ciphers, Block Ciphers, Cryptographic Hash Functions
1Jingsha He, Virgil D. Gligor Formal Methods and Automated Tool for Timing-Channel Identification in TCB Source Code. Search on Bibsonomy ESORICS The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
1Kwok-Yan Lam, Dieter Gollmann Freshness Assurance of Authentication Protocols. Search on Bibsonomy ESORICS The full citation details ... 1992 DBLP  DOI  BibTeX  RDF Clock Synchronization Protocol, Network Security, Authentication Protocols, Distributed Operating Systems
1Bruno d'Ausbourg, Jean-Henri Llareus M2S: A Machine for Multilevel Security. Search on Bibsonomy ESORICS The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
1Volker Kessler On the Chinese Wall Model. Search on Bibsonomy ESORICS The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
1Refik Molva, Gene Tsudik, Els Van Herreweghen, Stefano Zatti KryptoKnight Authentication and Key Distribution System. Search on Bibsonomy ESORICS The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
1Anas Tarah, Christian Huitema Associating Metrics to Certification Paths. Search on Bibsonomy ESORICS The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
1Marie-Jeanne Toussaint Separating the Specification and Implementation Phases in Cryptology. Search on Bibsonomy ESORICS The full citation details ... 1992 DBLP  DOI  BibTeX  RDF knowledge state, protocol execution tree, security, formal verification, cryptographic protocol, cryptology
1John A. Bull, Li Gong, Karen R. Sollins Towards Security in an Open Systems Federation. Search on Bibsonomy ESORICS The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
1Günther Pernul Security Constraint Processing in Multilevel Secure AMAC Schemata. Search on Bibsonomy ESORICS The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
1Christel Calas GDoM: a Multilevel Document Manager. Search on Bibsonomy ESORICS The full citation details ... 1992 DBLP  DOI  BibTeX  RDF multilevel security (mls), mls application, mls document manager, mls Unix kernel, computer security
1Ralf C. Hauser, E. Stewart Lee Verification and Modelling of Authentication Protocols. Search on Bibsonomy ESORICS The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
1Andrew J. I. Jones, Marek J. Sergot Formal Specification of Security Requirements using the Theory of Normative Positions. Search on Bibsonomy ESORICS The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
1Iwen E. Kang, Thomas F. Keefe On Transaction Processing for Multilevel Secure Replicated Databases. Search on Bibsonomy ESORICS The full citation details ... 1992 DBLP  DOI  BibTeX  RDF Global Transaction Manager, Transaction Processing, Multilevel Secure, Replicated Database
1Kwok-Yan Lam, Thomas Beth Timely Authentication in Distributed Systems. Search on Bibsonomy ESORICS The full citation details ... 1992 DBLP  DOI  BibTeX  RDF Authentication Protocols, Interprocess Communications, Distributed Operating Systems
1Yvo Desmedt Breaking the Traditional Computer Security Barriers. Search on Bibsonomy ESORICS The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
1Gene Tsudik Policy Enforcement in Stub Autonomous Domains. Search on Bibsonomy ESORICS The full citation details ... 1992 DBLP  DOI  BibTeX  RDF inter-domain communication, data integrity, network protocols, internetworking, authentication protocols, communication security
1Naji Habra, Baudouin Le Charlier, Abdelaziz Mounji, Isabelle Mathieu ASAX: Software Architecture and Rule-Based Language for Universal Audit Trail Analysis. Search on Bibsonomy ESORICS The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
1Udo Kelter Type-Level Access Controls for Distributed Structurally Object-Oriented Database Systems. Search on Bibsonomy ESORICS The full citation details ... 1992 DBLP  DOI  BibTeX  RDF group-orientation, distribution, views, multiple inheritance, object-oriented database systems, access control lists, discretionary access controls
1Ross J. Anderson UEPS - A Second Generation Electronic Wallet. Search on Bibsonomy ESORICS The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
1Ravi S. Sandhu, Sushil Jajodia Polyinstantation for Cover Stories. Search on Bibsonomy ESORICS The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
1Dominique de Waleffe, Jean-Jacques Quisquater Better Login Protocols for Computer Networks. Search on Bibsonomy ESORICS The full citation details ... 1990 DBLP  BibTeX  RDF
1Pierre Bieber Epistemic Verification of Cryptographic Protocols. Search on Bibsonomy ESORICS The full citation details ... 1990 DBLP  BibTeX  RDF
1Joachim Biskup A General Framework for Database Security. Search on Bibsonomy ESORICS The full citation details ... 1990 DBLP  BibTeX  RDF
1E. Stewart Lee, Brian W. Thomson, Peter I. P. Boulton, Michael Stumm An Architecture for a Trusted Network. Search on Bibsonomy ESORICS The full citation details ... 1990 DBLP  BibTeX  RDF
1Udo Kelter Group-Oriented Discretionary Access Controls for Distributed Structurally Object-Oriented Database Systems. Search on Bibsonomy ESORICS The full citation details ... 1990 DBLP  BibTeX  RDF
1Teresa F. Lunt, Donovan Hsieh The SeaView Secure Database System: A Progress Report. Search on Bibsonomy ESORICS The full citation details ... 1990 DBLP  BibTeX  RDF
1Gerhard Hoffmann, Stephan Lechner, Matthias Leclerc, Ferdinand Steiner Authentication and Access Control in a Distributed System. Search on Bibsonomy ESORICS The full citation details ... 1990 DBLP  BibTeX  RDF
1Ian F. Akyildiz, Glenn S. Benson A Security Reclassifier for a Local Area Network. Search on Bibsonomy ESORICS The full citation details ... 1990 DBLP  BibTeX  RDF
1Eric Deberdt, Sylvain Martin Methodology "Minerve Security" - Evaluation Process of Software Security. Search on Bibsonomy ESORICS The full citation details ... 1990 DBLP  BibTeX  RDF
1Kioumars Yazdanian Relational Database Granularity. Search on Bibsonomy ESORICS The full citation details ... 1990 DBLP  BibTeX  RDF
1Frédéric Cuppens An Epistemic and Deontic Logic for Reasoning about Computer Security. Search on Bibsonomy ESORICS The full citation details ... 1990 DBLP  BibTeX  RDF
1Jörg Kaiser An Object-Oriented Architecture to Support System Reliability and Security. Search on Bibsonomy ESORICS The full citation details ... 1990 DBLP  BibTeX  RDF
1Gill Randell A Case Study in the Formal Refinement of a Distributed Secure System. Search on Bibsonomy ESORICS The full citation details ... 1990 DBLP  BibTeX  RDF
1Marc Girault, Jean Claude Paillès An Identity-Based Scheme Providing Zero-Knowledge Authentication and Authenticated Key Exchange. Search on Bibsonomy ESORICS The full citation details ... 1990 DBLP  BibTeX  RDF
1D. J. Bailey Managing Computer Security: How Can Research Help? Search on Bibsonomy ESORICS The full citation details ... 1990 DBLP  BibTeX  RDF
1Colin O'Halloran A Calculus of Information Flow. Search on Bibsonomy ESORICS The full citation details ... 1990 DBLP  BibTeX  RDF
1 ESORICS 90 - First European Symposium on Research in Computer Security, October 24-26, 1990, Toulouse, France Search on Bibsonomy ESORICS The full citation details ... 1990 DBLP  BibTeX  RDF
1Zoran Savic, Mihajlo Komocar Security Kernel Design and Implementation in the IBM PC Environment. Search on Bibsonomy ESORICS The full citation details ... 1990 DBLP  BibTeX  RDF
1Brian W. Thomson, E. Stewart Lee, Peter I. P. Boulton, Michael Stumm, David M. Lewis Using Deducibility in Secure Network Modelling. Search on Bibsonomy ESORICS The full citation details ... 1990 DBLP  BibTeX  RDF
1Anas Tarah, Christian Huitema CHIMÆRA: A Network Security Model. Search on Bibsonomy ESORICS The full citation details ... 1990 DBLP  BibTeX  RDF
1R. W. Jones A General Mechanism for Access Control: Its Relationship to Secure System Concepts. Search on Bibsonomy ESORICS The full citation details ... 1990 DBLP  BibTeX  RDF
1Laurent Blain, Yves Deswarte An Intrusion-Tolerant Security Server for an Open Distributed System. Search on Bibsonomy ESORICS The full citation details ... 1990 DBLP  BibTeX  RDF
1Ernest S. Hocking, John Alexander McDermid Towards an Object Oriented Development Environment for Secure Applications. Search on Bibsonomy ESORICS The full citation details ... 1990 DBLP  BibTeX  RDF
1P. Casey, A. Brouwer, D. Herson, J.-F. Pacault, F. Taal, U. Van Essen Harmonised Criteria for the Security Evaluation of IT Systems and Products. Search on Bibsonomy ESORICS The full citation details ... 1990 DBLP  BibTeX  RDF
1Jacques Patarin Pseudorandom Permutations Based on the D.E.S. Scheme. Search on Bibsonomy ESORICS The full citation details ... 1990 DBLP  BibTeX  RDF
Displaying result #501 - #570 of 570 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license