Conferences in DBLP
Pierre Bieber , Jacques Cazin , Pierre Girard , Jean-Louis Lanet , Virginie Wiels , Guy Zanon Checking Secure Interactions of Smart Card Applets. [Citation Graph (0, 0)][DBLP ] ESORICS, 2000, pp:1-16 [Conf ] Gerhard Schellhorn , Wolfgang Reif , Axel Schairer , Paul A. Karger , Vernon Austel , David C. Toll Verification of a Formal Security Model for Multiapplicative Smart Cards. [Citation Graph (0, 0)][DBLP ] ESORICS, 2000, pp:17-36 [Conf ] Kai Rannenberg How Much Negotiation and Detail Can Users Handle? Experiences with Security Negotiation and the Granularity of Access Control in Communications. [Citation Graph (0, 0)][DBLP ] ESORICS, 2000, pp:37-54 [Conf ] Els Van Herreweghen Secure Anonymous Signature-Based Transactions. [Citation Graph (0, 0)][DBLP ] ESORICS, 2000, pp:55-71 [Conf ] Barbara Masucci , Douglas R. Stinson Metering Schemes for General Access Structures. [Citation Graph (0, 0)][DBLP ] ESORICS, 2000, pp:72-87 [Conf ] Gerald Brose A Typed Access Control Model for CORBA. [Citation Graph (0, 0)][DBLP ] ESORICS, 2000, pp:88-105 [Conf ] Masakazu Soshi Safety Analysis of the Dynamic-Typed Access Matrix Model. [Citation Graph (0, 0)][DBLP ] ESORICS, 2000, pp:106-121 [Conf ] Manuel Koch , Luigi V. Mancini , Francesco Parisi-Presicce A Formal Model for Role-Based Access Control Using Graph Transformation. [Citation Graph (0, 0)][DBLP ] ESORICS, 2000, pp:122-139 [Conf ] Jon Howell , David Kotz A Formal Semantics for SPKI. [Citation Graph (0, 0)][DBLP ] ESORICS, 2000, pp:140-158 [Conf ] Giampaolo Bella , Fabio Massacci , Lawrence C. Paulson , Piero Tramontano Formal Verification of Cardholder Registration in SET. [Citation Graph (0, 0)][DBLP ] ESORICS, 2000, pp:159-174 [Conf ] Philippa J. Broadfoot , Gavin Lowe , A. W. Roscoe Automating Data Independence. [Citation Graph (0, 0)][DBLP ] ESORICS, 2000, pp:175-190 [Conf ] Kunikazu Yoda , Hiroaki Etoh Finding a Connection Chain for Tracing Intruders. [Citation Graph (0, 0)][DBLP ] ESORICS, 2000, pp:191-205 [Conf ] Olivier Paul , Maryline Laurent , Sylvain Gombault A Full Bandwidth ATM Firewall. [Citation Graph (0, 0)][DBLP ] ESORICS, 2000, pp:206-221 [Conf ] Neil Evans , Steve Schneider Analysing Time Dependent Security Properties in CSP Using PVS. [Citation Graph (0, 0)][DBLP ] ESORICS, 2000, pp:222-237 [Conf ] Heiko Mantel Unwinding Possibilistic Security Properties. [Citation Graph (0, 0)][DBLP ] ESORICS, 2000, pp:238-254 [Conf ] Joshua D. Guttman , Amy L. Herzog , F. Javier Thayer Authentication and Confidentiality via IPSEC. [Citation Graph (0, 0)][DBLP ] ESORICS, 2000, pp:255-272 [Conf ] Ciarán Bryce A Security Framework for a Mobile Agent System. [Citation Graph (0, 0)][DBLP ] ESORICS, 2000, pp:273-290 [Conf ] Refik Molva , Yves Roudier A Distributed Access Control Model for Java. [Citation Graph (0, 0)][DBLP ] ESORICS, 2000, pp:291-308 [Conf ] Ian Welch , Robert J. Stroud Using Reflection as a Mechanism for Enforcing Security Policies in Mobile Code. [Citation Graph (0, 0)][DBLP ] ESORICS, 2000, pp:309-323 [Conf ]