The SCEAS System
Navigation Menu

Conferences in DBLP

European Symposium on Research in Computer Security (ESORICS) (esorics)
2004 (conf/esorics/2004)

  1. Shiping Chen, Duminda Wijesekera, Sushil Jajodia
    Incorporating Dynamic Constraints in the Flexible Authorization Framework. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2004, pp:1-16 [Conf]
  2. Naizhen Qi, Michiharu Kudo
    Access-Condition-Table-Driven Access Control for XML Databases. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2004, pp:17-32 [Conf]
  3. Michael Backes, Markus Dürmuth, Rainer Steinwandt
    An Algebra for Composing Enterprise Privacy Policies. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2004, pp:33-52 [Conf]
  4. Catherine Meadows, Dusko Pavlovic
    Deriving, Attacking and Defending the GDOI Protocol. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2004, pp:53-72 [Conf]
  5. Jan Camenisch
    Better Privacy for Trusted Computing Platforms: (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    ESORICS, 2004, pp:73-88 [Conf]
  6. Michael Backes
    A Cryptographically Sound Dolev-Yao Style Security Proof of the Otway-Rees Protocol. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2004, pp:89-108 [Conf]
  7. Sjouke Mauw, Jan Verschuren, Erik P. de Vink
    A Formalization of Anonymity and Onion Routing. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2004, pp:109-124 [Conf]
  8. Rainer Böhme, Andreas Westfeld
    Breaking Cauchy Model-Based JPEG Steganography with First Order Statistics. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2004, pp:125-140 [Conf]
  9. Claudia Díaz, Len Sassaman, Evelyne Dewitte
    Comparison Between Two Practical Mix Designs. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2004, pp:141-159 [Conf]
  10. Einar Mykletun, Maithili Narasimha, Gene Tsudik
    Signature Bouquets: Immutability for Aggregated/Condensed Signatures. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2004, pp:160-176 [Conf]
  11. James Aspnes, Joan Feigenbaum, Aleksandr Yampolskiy, Sheng Zhong
    Towards a Theory of Data Entanglement: (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    ESORICS, 2004, pp:177-192 [Conf]
  12. Mikhail J. Atallah, Marina Bykova
    Portable and Flexible Document Access Control Mechanisms. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2004, pp:193-208 [Conf]
  13. Dieter Hutter, Axel Schairer
    Possibilistic Information Flow Control in the Presence of Encrypted Communication. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2004, pp:209-224 [Conf]
  14. David von Oheimb
    Information Flow Control Revisited: Noninfluence = Noninterference + Nonleakage. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2004, pp:225-243 [Conf]
  15. Jon A. Solworth, Robert H. Sloan
    Security Property Based Administrative Controls. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2004, pp:244-259 [Conf]
  16. Indrajit Ray, Sudip Chakraborty
    A Vector Model of Trust for Developing Trustworthy Systems. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2004, pp:260-275 [Conf]
  17. Michael J. Covington, Mustaque Ahamad, Irfan A. Essa, H. Venkateswaran
    Parameterized Authentication. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2004, pp:276-292 [Conf]
  18. Seyit Ahmet Çamtepe, Bülent Yener
    Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2004, pp:293-308 [Conf]
  19. Claude Castelluccia, Gabriel Montenegro, Julien Laganier, Christoph Neumann
    Hindering Eavesdropping via IPv6 Opportunistic Encryption. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2004, pp:309-321 [Conf]
  20. Lars R. Knudsen, John Erik Mathiassen
    On the Role of Key Schedules in Attacks on Iterated Ciphers. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2004, pp:322-334 [Conf]
  21. Bodo Möller
    A Public-Key Encryption Scheme with Pseudo-random Ciphertexts. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2004, pp:335-351 [Conf]
  22. Roberto Battistoni, Emanuele Gabrielli, Luigi V. Mancini
    A Host Intrusion Prevention System for Windows Operating Systems. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2004, pp:352-368 [Conf]
  23. Julian B. Grizzard, John G. Levine, Henry L. Owen
    Re-establishing Trust in Compromised Systems: Recovering from Rootkits That Trojan the System Call Table. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2004, pp:369-384 [Conf]
  24. Ramkumar Chinchani, Anusha Iyer, Bharat Jayaraman, Shambhu J. Upadhyaya
    ARCHERR: Runtime Environment Driven Program Safety. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2004, pp:385-406 [Conf]
  25. John McHugh
    Sets, Bags, and Rock and Roll: Analyzing Large Data Sets of Network Data. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2004, pp:407-422 [Conf]
  26. Bev Littlewood, Lorenzo Strigini
    Redundancy and Diversity in Security. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2004, pp:423-438 [Conf]
  27. Xinzhou Qin, Wenke Lee
    Discovering Novel Attack Strategies from INFOSEC Alerts. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2004, pp:439-456 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002