Conferences in DBLP
Shiping Chen , Duminda Wijesekera , Sushil Jajodia Incorporating Dynamic Constraints in the Flexible Authorization Framework. [Citation Graph (0, 0)][DBLP ] ESORICS, 2004, pp:1-16 [Conf ] Naizhen Qi , Michiharu Kudo Access-Condition-Table-Driven Access Control for XML Databases. [Citation Graph (0, 0)][DBLP ] ESORICS, 2004, pp:17-32 [Conf ] Michael Backes , Markus Dürmuth , Rainer Steinwandt An Algebra for Composing Enterprise Privacy Policies. [Citation Graph (0, 0)][DBLP ] ESORICS, 2004, pp:33-52 [Conf ] Catherine Meadows , Dusko Pavlovic Deriving, Attacking and Defending the GDOI Protocol. [Citation Graph (0, 0)][DBLP ] ESORICS, 2004, pp:53-72 [Conf ] Jan Camenisch Better Privacy for Trusted Computing Platforms: (Extended Abstract). [Citation Graph (0, 0)][DBLP ] ESORICS, 2004, pp:73-88 [Conf ] Michael Backes A Cryptographically Sound Dolev-Yao Style Security Proof of the Otway-Rees Protocol. [Citation Graph (0, 0)][DBLP ] ESORICS, 2004, pp:89-108 [Conf ] Sjouke Mauw , Jan Verschuren , Erik P. de Vink A Formalization of Anonymity and Onion Routing. [Citation Graph (0, 0)][DBLP ] ESORICS, 2004, pp:109-124 [Conf ] Rainer Böhme , Andreas Westfeld Breaking Cauchy Model-Based JPEG Steganography with First Order Statistics. [Citation Graph (0, 0)][DBLP ] ESORICS, 2004, pp:125-140 [Conf ] Claudia Díaz , Len Sassaman , Evelyne Dewitte Comparison Between Two Practical Mix Designs. [Citation Graph (0, 0)][DBLP ] ESORICS, 2004, pp:141-159 [Conf ] Einar Mykletun , Maithili Narasimha , Gene Tsudik Signature Bouquets: Immutability for Aggregated/Condensed Signatures. [Citation Graph (0, 0)][DBLP ] ESORICS, 2004, pp:160-176 [Conf ] James Aspnes , Joan Feigenbaum , Aleksandr Yampolskiy , Sheng Zhong Towards a Theory of Data Entanglement: (Extended Abstract). [Citation Graph (0, 0)][DBLP ] ESORICS, 2004, pp:177-192 [Conf ] Mikhail J. Atallah , Marina Bykova Portable and Flexible Document Access Control Mechanisms. [Citation Graph (0, 0)][DBLP ] ESORICS, 2004, pp:193-208 [Conf ] Dieter Hutter , Axel Schairer Possibilistic Information Flow Control in the Presence of Encrypted Communication. [Citation Graph (0, 0)][DBLP ] ESORICS, 2004, pp:209-224 [Conf ] David von Oheimb Information Flow Control Revisited: Noninfluence = Noninterference + Nonleakage. [Citation Graph (0, 0)][DBLP ] ESORICS, 2004, pp:225-243 [Conf ] Jon A. Solworth , Robert H. Sloan Security Property Based Administrative Controls. [Citation Graph (0, 0)][DBLP ] ESORICS, 2004, pp:244-259 [Conf ] Indrajit Ray , Sudip Chakraborty A Vector Model of Trust for Developing Trustworthy Systems. [Citation Graph (0, 0)][DBLP ] ESORICS, 2004, pp:260-275 [Conf ] Michael J. Covington , Mustaque Ahamad , Irfan A. Essa , H. Venkateswaran Parameterized Authentication. [Citation Graph (0, 0)][DBLP ] ESORICS, 2004, pp:276-292 [Conf ] Seyit Ahmet Çamtepe , Bülent Yener Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP ] ESORICS, 2004, pp:293-308 [Conf ] Claude Castelluccia , Gabriel Montenegro , Julien Laganier , Christoph Neumann Hindering Eavesdropping via IPv6 Opportunistic Encryption. [Citation Graph (0, 0)][DBLP ] ESORICS, 2004, pp:309-321 [Conf ] Lars R. Knudsen , John Erik Mathiassen On the Role of Key Schedules in Attacks on Iterated Ciphers. [Citation Graph (0, 0)][DBLP ] ESORICS, 2004, pp:322-334 [Conf ] Bodo Möller A Public-Key Encryption Scheme with Pseudo-random Ciphertexts. [Citation Graph (0, 0)][DBLP ] ESORICS, 2004, pp:335-351 [Conf ] Roberto Battistoni , Emanuele Gabrielli , Luigi V. Mancini A Host Intrusion Prevention System for Windows Operating Systems. [Citation Graph (0, 0)][DBLP ] ESORICS, 2004, pp:352-368 [Conf ] Julian B. Grizzard , John G. Levine , Henry L. Owen Re-establishing Trust in Compromised Systems: Recovering from Rootkits That Trojan the System Call Table. [Citation Graph (0, 0)][DBLP ] ESORICS, 2004, pp:369-384 [Conf ] Ramkumar Chinchani , Anusha Iyer , Bharat Jayaraman , Shambhu J. Upadhyaya ARCHERR: Runtime Environment Driven Program Safety. [Citation Graph (0, 0)][DBLP ] ESORICS, 2004, pp:385-406 [Conf ] John McHugh Sets, Bags, and Rock and Roll: Analyzing Large Data Sets of Network Data. [Citation Graph (0, 0)][DBLP ] ESORICS, 2004, pp:407-422 [Conf ] Bev Littlewood , Lorenzo Strigini Redundancy and Diversity in Security. [Citation Graph (0, 0)][DBLP ] ESORICS, 2004, pp:423-438 [Conf ] Xinzhou Qin , Wenke Lee Discovering Novel Attack Strategies from INFOSEC Alerts. [Citation Graph (0, 0)][DBLP ] ESORICS, 2004, pp:439-456 [Conf ]