Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Amihai Motro, Donald G. Marks, Sushil Jajodia |
Aggregation in Relational Databases: Controlled Disclosure of Sensitive Information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 94, Third European Symposium on Research in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings, pp. 431-445, 1994, Springer, 3-540-58618-0. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Ueli M. Maurer, Pierre E. Schmid |
A Calculus for Secure Channel Establishment in Open Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 94, Third European Symposium on Research in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings, pp. 175-192, 1994, Springer, 3-540-58618-0. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
Security transformations, Cryptography, Network security, Key management, Formal models |
1 | C. L. Robinson, Simon R. Wiseman |
A Consideration of the Modes of Operation for Secure Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 94, Third European Symposium on Research in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings, pp. 335-356, 1994, Springer, 3-540-58618-0. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
Security Mode of Operation, Dedicated, System High, Compartmented, System Model, Z Notation, Multi-Level |
1 | Jan Camenisch, Jean-Marc Piveteau, Markus Stadler |
An Efficient Electronic Payment System Protecting Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 94, Third European Symposium on Research in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings, pp. 207-215, 1994, Springer, 3-540-58618-0. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
privacy, cryptography, electronic payment systems |
1 | Jean-Pierre Banâtre, Ciarán Bryce, Daniel Le Métayer |
Compile-Time Detection of Information Flow in Sequential Programs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 94, Third European Symposium on Research in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings, pp. 55-73, 1994, Springer, 3-540-58618-0. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
formal verification, program analysis, computer security, information flow, verification tools |
1 | Pierre Siron, Bruno d'Ausbourg |
A Secure Medium Access Control Protocol: Security vs Performances. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 94, Third European Symposium on Research in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings, pp. 267-279, 1994, Springer, 3-540-58618-0. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Ralf C. Hauser, Philippe A. Janson, Refik Molva, Gene Tsudik, Els Van Herreweghen |
Robust and Secure Password and Key Change Method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 94, Third European Symposium on Research in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings, pp. 107-122, 1994, Springer, 3-540-58618-0. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Bruno d'Ausbourg |
Implementing Secure Dependencies over a Network by Designing a Distributed Security SubSystem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 94, Third European Symposium on Research in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings, pp. 249-266, 1994, Springer, 3-540-58618-0. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Christel Calas |
Distributed File System over a Multilevel Secure Architecture - Problems and Solutions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 94, Third European Symposium on Research in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings, pp. 281-297, 1994, Springer, 3-540-58618-0. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
M2S machine, secure LAN, Security, Distributed file system, Multilevel security |
1 | A. W. Roscoe 0001, Jim Woodcock 0001, Lars Wulf |
Non-Interference Through Determinism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 94, Third European Symposium on Research in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings, pp. 33-53, 1994, Springer, 3-540-58618-0. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
Security, Formal methods, Process algebra, Determinism, Automatic verification, Non-interference |
1 | Roshan K. Thomas, Ravi S. Sandhu |
Supporting Object-Based High-Assurance Write-up in Multilevel Databases for the Replicated Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 94, Third European Symposium on Research in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings, pp. 403-428, 1994, Springer, 3-540-58618-0. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
Replicated architecture, writeup, serial correctness, signaling channels, object-oriented databases, message-filtering |
1 | Thomas Hardjono, Jennifer Seberry |
Authentication via Multi-Service Tickets in the Kuperee Server. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 94, Third European Symposium on Research in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings, pp. 143-160, 1994, Springer, 3-540-58618-0. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Alessandro Ciampichetti, Elisa Bertino, Luigi V. Mancini |
Mark-and-Sweep Garbage Collection in Multilevel Secure Object-Oriented Database Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 94, Third European Symposium on Research in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings, pp. 359-373, 1994, Springer, 3-540-58618-0. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
object deletion, mark-and-sweep, garbage collection, mandatory access control, object-oriented database systems |
1 | Wenbo Mao, Colin Boyd |
On Strengthening Authentication Protocols to Foil Cryptanalysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 94, Third European Symposium on Research in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings, pp. 193-204, 1994, Springer, 3-540-58618-0. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Jean-Paul Boly, Antoon Bosselaers, Ronald Cramer, Rolf Michelsen, Stig Fr. Mjølsnes, Frank Muller, Torben P. Pedersen, Birgit Pfitzmann, Peter de Rooij, Berry Schoenmakers, Matthias Schunter, Luc Vallée, Michael Waidner |
The ESPRIT Project CAFE - High Security Digital Payment Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 94, Third European Symposium on Research in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings, pp. 217-230, 1994, Springer, 3-540-58618-0. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
Security in Applications (Financial) - Security Versus other Requirements (Performance, Fault Tolerance) |
1 | Dieter Gollmann (eds.) |
Computer Security - ESORICS 94, Third European Symposium on Research in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![Springer, 3-540-58618-0 The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Lidong Chen |
Oblivious Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 94, Third European Symposium on Research in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings, pp. 161-172, 1994, Springer, 3-540-58618-0. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
oblivious signatures |
1 | Colin O'Halloran, Chris T. Sennett |
Security Through Type Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 94, Third European Symposium on Research in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings, pp. 75-89, 1994, Springer, 3-540-58618-0. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
secure computer systems, Types, formal techniques, security evaluation |
1 | Thomas Beth, Malte Borcherding, Birgit Klein |
Valuation of Trust in Open Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 94, Third European Symposium on Research in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings, pp. 3-18, 1994, Springer, 3-540-58618-0. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
Trust values, Trust measures, Distributed systems |
1 | Ravi S. Sandhu, Srinivas Ganta |
On the Expressive Power of the Unary Transformation Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 94, Third European Symposium on Research in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings, pp. 301-318, 1994, Springer, 3-540-58618-0. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
Access Control, Authorization, Expressive Power, Client-Server Architecture, Access Rights |
1 | Yves Deswarte, Gérard Eizenberg, Jean-Jacques Quisquater (eds.) |
Computer Security - ESORICS 92, Second European Symposium on Research in Computer Security, Toulouse, France, November 23-25, 1992, Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![Springer, 3-540-56246-X The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Jean-Charles Fabre, Brian Randell |
An Object-Oriented View of Fragmented Data Processing for Fault and Intrusion Tolerance in Distributed Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 92, Second European Symposium on Research in Computer Security, Toulouse, France, November 23-25, 1992, Proceedings, pp. 193-208, 1992, Springer, 3-540-56246-X. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Colin Boyd |
A Formal Framework for Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 92, Second European Symposium on Research in Computer Security, Toulouse, France, November 23-25, 1992, Proceedings, pp. 273-292, 1992, Springer, 3-540-56246-X. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
security standards, formal models, Authentication protocols |
1 | Michael Wang, Andrzej M. Goscinski |
The Development and Testing of the Identity-Based Conference Key Distribution System for the RHODOS Distributed System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 92, Second European Symposium on Research in Computer Security, Toulouse, France, November 23-25, 1992, Proceedings, pp. 209-228, 1992, Springer, 3-540-56246-X. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
Identity-based Conference Key Distribution, Distributed Systems, Authentication, Distributed Operating Systems |
1 | Joan Daemen, René Govaerts, Joos Vandewalle |
A Hardware Design Model for Cryptographic Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 92, Second European Symposium on Research in Computer Security, Toulouse, France, November 23-25, 1992, Proceedings, pp. 419-434, 1992, Springer, 3-540-56246-X. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
Hardware Cryptography, Pseudorandom Sequence Generators, Stream Ciphers, Block Ciphers, Cryptographic Hash Functions |
1 | Jingsha He, Virgil D. Gligor |
Formal Methods and Automated Tool for Timing-Channel Identification in TCB Source Code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 92, Second European Symposium on Research in Computer Security, Toulouse, France, November 23-25, 1992, Proceedings, pp. 57-76, 1992, Springer, 3-540-56246-X. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Kwok-Yan Lam, Dieter Gollmann |
Freshness Assurance of Authentication Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 92, Second European Symposium on Research in Computer Security, Toulouse, France, November 23-25, 1992, Proceedings, pp. 261-272, 1992, Springer, 3-540-56246-X. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
Clock Synchronization Protocol, Network Security, Authentication Protocols, Distributed Operating Systems |
1 | Bruno d'Ausbourg, Jean-Henri Llareus |
M2S: A Machine for Multilevel Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 92, Second European Symposium on Research in Computer Security, Toulouse, France, November 23-25, 1992, Proceedings, pp. 373-392, 1992, Springer, 3-540-56246-X. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Volker Kessler |
On the Chinese Wall Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 92, Second European Symposium on Research in Computer Security, Toulouse, France, November 23-25, 1992, Proceedings, pp. 41-54, 1992, Springer, 3-540-56246-X. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Refik Molva, Gene Tsudik, Els Van Herreweghen, Stefano Zatti |
KryptoKnight Authentication and Key Distribution System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 92, Second European Symposium on Research in Computer Security, Toulouse, France, November 23-25, 1992, Proceedings, pp. 155-174, 1992, Springer, 3-540-56246-X. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Anas Tarah, Christian Huitema |
Associating Metrics to Certification Paths. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 92, Second European Symposium on Research in Computer Security, Toulouse, France, November 23-25, 1992, Proceedings, pp. 175-189, 1992, Springer, 3-540-56246-X. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Marie-Jeanne Toussaint |
Separating the Specification and Implementation Phases in Cryptology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 92, Second European Symposium on Research in Computer Security, Toulouse, France, November 23-25, 1992, Proceedings, pp. 77-102, 1992, Springer, 3-540-56246-X. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
knowledge state, protocol execution tree, security, formal verification, cryptographic protocol, cryptology |
1 | John A. Bull, Li Gong, Karen R. Sollins |
Towards Security in an Open Systems Federation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 92, Second European Symposium on Research in Computer Security, Toulouse, France, November 23-25, 1992, Proceedings, pp. 3-20, 1992, Springer, 3-540-56246-X. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Günther Pernul |
Security Constraint Processing in Multilevel Secure AMAC Schemata. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 92, Second European Symposium on Research in Computer Security, Toulouse, France, November 23-25, 1992, Proceedings, pp. 349-370, 1992, Springer, 3-540-56246-X. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Christel Calas |
GDoM: a Multilevel Document Manager. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 92, Second European Symposium on Research in Computer Security, Toulouse, France, November 23-25, 1992, Proceedings, pp. 393-408, 1992, Springer, 3-540-56246-X. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
multilevel security (mls), mls application, mls document manager, mls Unix kernel, computer security |
1 | Ralf C. Hauser, E. Stewart Lee |
Verification and Modelling of Authentication Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 92, Second European Symposium on Research in Computer Security, Toulouse, France, November 23-25, 1992, Proceedings, pp. 141-154, 1992, Springer, 3-540-56246-X. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Andrew J. I. Jones, Marek J. Sergot |
Formal Specification of Security Requirements using the Theory of Normative Positions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 92, Second European Symposium on Research in Computer Security, Toulouse, France, November 23-25, 1992, Proceedings, pp. 103-121, 1992, Springer, 3-540-56246-X. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Iwen E. Kang, Thomas F. Keefe |
On Transaction Processing for Multilevel Secure Replicated Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 92, Second European Symposium on Research in Computer Security, Toulouse, France, November 23-25, 1992, Proceedings, pp. 329-348, 1992, Springer, 3-540-56246-X. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
Global Transaction Manager, Transaction Processing, Multilevel Secure, Replicated Database |
1 | Kwok-Yan Lam, Thomas Beth |
Timely Authentication in Distributed Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 92, Second European Symposium on Research in Computer Security, Toulouse, France, November 23-25, 1992, Proceedings, pp. 293-303, 1992, Springer, 3-540-56246-X. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
Authentication Protocols, Interprocess Communications, Distributed Operating Systems |
1 | Yvo Desmedt |
Breaking the Traditional Computer Security Barriers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 92, Second European Symposium on Research in Computer Security, Toulouse, France, November 23-25, 1992, Proceedings, pp. 125-138, 1992, Springer, 3-540-56246-X. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Gene Tsudik |
Policy Enforcement in Stub Autonomous Domains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 92, Second European Symposium on Research in Computer Security, Toulouse, France, November 23-25, 1992, Proceedings, pp. 229-257, 1992, Springer, 3-540-56246-X. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
inter-domain communication, data integrity, network protocols, internetworking, authentication protocols, communication security |
1 | Naji Habra, Baudouin Le Charlier, Abdelaziz Mounji, Isabelle Mathieu |
ASAX: Software Architecture and Rule-Based Language for Universal Audit Trail Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 92, Second European Symposium on Research in Computer Security, Toulouse, France, November 23-25, 1992, Proceedings, pp. 435-450, 1992, Springer, 3-540-56246-X. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Udo Kelter |
Type-Level Access Controls for Distributed Structurally Object-Oriented Database Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 92, Second European Symposium on Research in Computer Security, Toulouse, France, November 23-25, 1992, Proceedings, pp. 21-40, 1992, Springer, 3-540-56246-X. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
group-orientation, distribution, views, multiple inheritance, object-oriented database systems, access control lists, discretionary access controls |
1 | Ross J. Anderson |
UEPS - A Second Generation Electronic Wallet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 92, Second European Symposium on Research in Computer Security, Toulouse, France, November 23-25, 1992, Proceedings, pp. 411-418, 1992, Springer, 3-540-56246-X. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Ravi S. Sandhu, Sushil Jajodia |
Polyinstantation for Cover Stories. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 92, Second European Symposium on Research in Computer Security, Toulouse, France, November 23-25, 1992, Proceedings, pp. 307-328, 1992, Springer, 3-540-56246-X. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Dominique de Waleffe, Jean-Jacques Quisquater |
Better Login Protocols for Computer Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: ESORICS 90 - First European Symposium on Research in Computer Security, October 24-26, 1990, Toulouse, France, pp. 163-172, 1990, AFCET. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP BibTeX RDF |
|
1 | Pierre Bieber |
Epistemic Verification of Cryptographic Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: ESORICS 90 - First European Symposium on Research in Computer Security, October 24-26, 1990, Toulouse, France, pp. 211-221, 1990, AFCET. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP BibTeX RDF |
|
1 | Joachim Biskup |
A General Framework for Database Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: ESORICS 90 - First European Symposium on Research in Computer Security, October 24-26, 1990, Toulouse, France, pp. 35-41, 1990, AFCET. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP BibTeX RDF |
|
1 | E. Stewart Lee, Brian W. Thomson, Peter I. P. Boulton, Michael Stumm |
An Architecture for a Trusted Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: ESORICS 90 - First European Symposium on Research in Computer Security, October 24-26, 1990, Toulouse, France, pp. 105-113, 1990, AFCET. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP BibTeX RDF |
|
1 | Udo Kelter |
Group-Oriented Discretionary Access Controls for Distributed Structurally Object-Oriented Database Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: ESORICS 90 - First European Symposium on Research in Computer Security, October 24-26, 1990, Toulouse, France, pp. 23-31, 1990, AFCET. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP BibTeX RDF |
|
1 | Teresa F. Lunt, Donovan Hsieh |
The SeaView Secure Database System: A Progress Report. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: ESORICS 90 - First European Symposium on Research in Computer Security, October 24-26, 1990, Toulouse, France, pp. 3-13, 1990, AFCET. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP BibTeX RDF |
|
1 | Gerhard Hoffmann, Stephan Lechner, Matthias Leclerc, Ferdinand Steiner |
Authentication and Access Control in a Distributed System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: ESORICS 90 - First European Symposium on Research in Computer Security, October 24-26, 1990, Toulouse, France, pp. 71-84, 1990, AFCET. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP BibTeX RDF |
|
1 | Ian F. Akyildiz, Glenn S. Benson |
A Security Reclassifier for a Local Area Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: ESORICS 90 - First European Symposium on Research in Computer Security, October 24-26, 1990, Toulouse, France, pp. 85-95, 1990, AFCET. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP BibTeX RDF |
|
1 | Eric Deberdt, Sylvain Martin |
Methodology "Minerve Security" - Evaluation Process of Software Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: ESORICS 90 - First European Symposium on Research in Computer Security, October 24-26, 1990, Toulouse, France, pp. 223-231, 1990, AFCET. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP BibTeX RDF |
|
1 | Kioumars Yazdanian |
Relational Database Granularity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: ESORICS 90 - First European Symposium on Research in Computer Security, October 24-26, 1990, Toulouse, France, pp. 15-20, 1990, AFCET. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP BibTeX RDF |
|
1 | Frédéric Cuppens |
An Epistemic and Deontic Logic for Reasoning about Computer Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: ESORICS 90 - First European Symposium on Research in Computer Security, October 24-26, 1990, Toulouse, France, pp. 135-145, 1990, AFCET. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP BibTeX RDF |
|
1 | Jörg Kaiser |
An Object-Oriented Architecture to Support System Reliability and Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: ESORICS 90 - First European Symposium on Research in Computer Security, October 24-26, 1990, Toulouse, France, pp. 51-60, 1990, AFCET. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP BibTeX RDF |
|
1 | Gill Randell |
A Case Study in the Formal Refinement of a Distributed Secure System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: ESORICS 90 - First European Symposium on Research in Computer Security, October 24-26, 1990, Toulouse, France, pp. 201-208, 1990, AFCET. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP BibTeX RDF |
|
1 | Marc Girault, Jean Claude Paillès |
An Identity-Based Scheme Providing Zero-Knowledge Authentication and Authenticated Key Exchange. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: ESORICS 90 - First European Symposium on Research in Computer Security, October 24-26, 1990, Toulouse, France, pp. 173-184, 1990, AFCET. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP BibTeX RDF |
|
1 | D. J. Bailey |
Managing Computer Security: How Can Research Help? ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: ESORICS 90 - First European Symposium on Research in Computer Security, October 24-26, 1990, Toulouse, France, pp. 235-241, 1990, AFCET. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP BibTeX RDF |
|
1 | Colin O'Halloran |
A Calculus of Information Flow. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: ESORICS 90 - First European Symposium on Research in Computer Security, October 24-26, 1990, Toulouse, France, pp. 147-159, 1990, AFCET. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP BibTeX RDF |
|
1 | |
ESORICS 90 - First European Symposium on Research in Computer Security, October 24-26, 1990, Toulouse, France ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![AFCET The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP BibTeX RDF |
|
1 | Zoran Savic, Mihajlo Komocar |
Security Kernel Design and Implementation in the IBM PC Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: ESORICS 90 - First European Symposium on Research in Computer Security, October 24-26, 1990, Toulouse, France, pp. 61-68, 1990, AFCET. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP BibTeX RDF |
|
1 | Brian W. Thomson, E. Stewart Lee, Peter I. P. Boulton, Michael Stumm, David M. Lewis |
Using Deducibility in Secure Network Modelling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: ESORICS 90 - First European Symposium on Research in Computer Security, October 24-26, 1990, Toulouse, France, pp. 117-123, 1990, AFCET. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP BibTeX RDF |
|
1 | Anas Tarah, Christian Huitema |
CHIMÆRA: A Network Security Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: ESORICS 90 - First European Symposium on Research in Computer Security, October 24-26, 1990, Toulouse, France, pp. 127-132, 1990, AFCET. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP BibTeX RDF |
|
1 | R. W. Jones |
A General Mechanism for Access Control: Its Relationship to Secure System Concepts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: ESORICS 90 - First European Symposium on Research in Computer Security, October 24-26, 1990, Toulouse, France, pp. 45-50, 1990, AFCET. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP BibTeX RDF |
|
1 | Laurent Blain, Yves Deswarte |
An Intrusion-Tolerant Security Server for an Open Distributed System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: ESORICS 90 - First European Symposium on Research in Computer Security, October 24-26, 1990, Toulouse, France, pp. 97-104, 1990, AFCET. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP BibTeX RDF |
|
1 | Ernest S. Hocking, John Alexander McDermid |
Towards an Object Oriented Development Environment for Secure Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: ESORICS 90 - First European Symposium on Research in Computer Security, October 24-26, 1990, Toulouse, France, pp. 191-200, 1990, AFCET. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP BibTeX RDF |
|
1 | P. Casey, A. Brouwer, D. Herson, J.-F. Pacault, F. Taal, U. Van Essen |
Harmonised Criteria for the Security Evaluation of IT Systems and Products. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: ESORICS 90 - First European Symposium on Research in Computer Security, October 24-26, 1990, Toulouse, France, pp. 243-249, 1990, AFCET. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP BibTeX RDF |
|
1 | Jacques Patarin |
Pseudorandom Permutations Based on the D.E.S. Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: ESORICS 90 - First European Symposium on Research in Computer Security, October 24-26, 1990, Toulouse, France, pp. 185-187, 1990, AFCET. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP BibTeX RDF |
|