default search action
8th ESORICS 2003: Gjøvik, Norway
- Einar Snekkenes, Dieter Gollmann:
Computer Security - ESORICS 2003, 8th European Symposium on Research in Computer Security, Gjøvik, Norway, October 13-15, 2003, Proceedings. Lecture Notes in Computer Science 2808, Springer 2003, ISBN 3-540-20300-1 - Elisa Bertino, Elena Ferrari, Loredana Parasiliti Provenza:
Signature and Access Control Policies for XML Documents. 1-22 - Dulce Domingos, António Rito Silva, Pedro Veiga:
Authorization and Access Control in Adaptive Workflows. 23-38 - Xuhui Ao, Naftaly H. Minsky:
Flexible Regulation of Distributed Coalitions. 39-60 - Dennis Hofheinz, Jörn Müller-Quade, Rainer Steinwandt:
Initiator-Resilient Universally Composable Key Exchange. 61-84 - Yuji Watanabe, Masayuki Numao:
Multi-round Secure-Light Broadcast Exclusion Protocol with Pre-processing. 85-99 - Lingyu Wang, Yingjiu Li, Duminda Wijesekera, Sushil Jajodia:
Precisely Answering Multi-dimensional Range Queries without Privacy Breaches. 100-115 - Andrei Serjantov, Peter Sewell:
Passive Attack Analysis for Connection-Based Anonymity Systems. 116-131 - Marcin Gomulkiewicz, Marek Klonowski, Miroslaw Kutylowski:
Rapid Mixing and Security of Chaum's Visual Electronic Voting. 132-145 - Marco Casassa Mont, Siani Pearson, Pete Bramhall:
Towards Accountable Management of Privacy and Identity Information. 146-161 - Michael Backes, Birgit Pfitzmann, Matthias Schunter:
A Toolkit for Managing Enterprise Privacy Policies. 162-180 - Helmut Scherzer, Ran Canetti, Paul A. Karger, Hugo Krawczyk, Tal Rabin, David C. Toll:
Authenticating Mandatory Access Controls and Preserving Privacy for a High-Assurance Smart Card. 181-200 - Adrian Baldwin, Simon Shiu:
Hardware Encapsulation of Security Services. 201-216 - David von Oheimb, Georg Walter, Volkmar Lotz:
A Formal Security Model of the Infineon SLE 88 Smart Card Memory Managment. 217-234 - Rogardt Heldal, Fredrik Hultin:
Bridging Model-Based and Language-Based Security. 235-252 - David A. Basin, Sebastian Mödersheim, Luca Viganò:
An On-the-Fly Model-Checker for Security Protocol Analysis. 253-270 - Michael Backes, Birgit Pfitzmann, Michael Waidner:
Symmetric Authentication within a Simulatable Cryptographic Library. 271-290 - Jacob Zimmermann, Ludovic Mé, Christophe Bidan:
An Improved Reference Flow Control Model for Policy-Based Intrusion Detection. 291-308 - Stefan Axelsson:
Visualisation for Intrusion Detection. 309-325 - Christopher Krügel, Darren Mutz, Fredrik Valeur, Giovanni Vigna:
On the Detection of Anomalous System Call Arguments. 326-343
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.