The SCEAS System
Navigation Menu

Conferences in DBLP

European Symposium on Research in Computer Security (ESORICS) (esorics)
2005 (conf/esorics/2005)

  1. Barbara Simons
    Computerized Voting Machines: A View from the Trenches. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2005, pp:1-2 [Conf]
  2. Naizhen Qi, Michiharu Kudo
    XML Access Control with Policy Matching Tree. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2005, pp:3-23 [Conf]
  3. Mariemma Inmaculada Yagüe del Valle, María-del-Mar Gallardo, Antonio Mana
    Semantic Access Control Model: A Formal Specification. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2005, pp:24-43 [Conf]
  4. Rajeev Gupta, Manish Bhide
    A Generic XACML Based Declarative Authorization Scheme for Java. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2005, pp:44-63 [Conf]
  5. Karsten Sohr, Gail-Joon Ahn, Martin Gogolla, Lars Migge
    Specification and Validation of Authorisation Constraints Using UML and OCL. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2005, pp:64-79 [Conf]
  6. Vijayalakshmi Atluri, Qi Guo
    Unified Index for Mobile Object Data and Authorizations. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2005, pp:80-97 [Conf]
  7. Manuel Hilty, David A. Basin, Alexander Pretschner
    On Obligations. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2005, pp:98-117 [Conf]
  8. David Chaum, Peter Y. A. Ryan, Steve A. Schneider
    A Practical Voter-Verifiable Election Scheme. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2005, pp:118-139 [Conf]
  9. Sabrina Tarento
    Machine-Checked Security Proofs of Cryptographic Signature Schemes. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2005, pp:140-158 [Conf]
  10. Giuseppe Ateniese, Daniel H. Chou, Breno de Medeiros, Gene Tsudik
    Sanitizable Signatures. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2005, pp:159-177 [Conf]
  11. Michael Backes, Birgit Pfitzmann
    Limits of the Cryptographic Realization of Dolev-Yao-Style XOR. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2005, pp:178-196 [Conf]
  12. Aslan Askarov, Andrei Sabelfeld
    Security-Typed Languages for Implementation of Cryptographic Protocols: A Case Study. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2005, pp:197-221 [Conf]
  13. Huafei Zhu, Feng Bao
    Augmented Oblivious Polynomial Evaluation Protocol and Its Applications. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2005, pp:222-230 [Conf]
  14. Indrajit Ray, Nayot Poolsapassit
    Using Attack Trees to Identify Malicious Attacks from Authorized Insiders. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2005, pp:231-246 [Conf]
  15. Lingyu Wang, Anyi Liu, Sushil Jajodia
    An Efficient and Unified Approach to Correlating, Hypothesizing, and Predicting Intrusion Alerts. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2005, pp:247-266 [Conf]
  16. Giovanni Di Crescenzo, Abhrajit Ghosh, Rajesh Talpade
    Towards a Theory of Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2005, pp:267-286 [Conf]
  17. João Porto de Albuquerque, Heiko Krumm, Paulo Lício de Geus
    On Scalability and Modularisation in the Modelling of Network Security Systems. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2005, pp:287-304 [Conf]
  18. George Danezis, Chris Lesniewski-Laas, M. Frans Kaashoek, Ross J. Anderson
    Sybil-Resistant DHT Routing. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2005, pp:305-318 [Conf]
  19. Felix C. Freiling, Thorsten Holz, Georg Wicherski
    Botnet Tracking: Exploring a Root-Cause Methodology to Prevent Distributed Denial-of-Service Attacks. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2005, pp:319-335 [Conf]
  20. Michael Backes
    Quantifying Probabilistic Information Flow in Computational Reactive Systems. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2005, pp:336-354 [Conf]
  21. Jay Ligatti, Lujo Bauer, David Walker
    Enforcing Non-safety Security Policies with Program Monitors. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2005, pp:355-373 [Conf]
  22. Pedro Adão, Gergei Bana, Jonathan Herzog, Andre Scedrov
    Soundness of Formal Encryption in the Presence of Key-Cycles. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2005, pp:374-396 [Conf]
  23. Somesh Jha, Louis Kruger, Patrick McDaniel
    Privacy Preserving Clustering. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2005, pp:397-417 [Conf]
  24. Sigrid Gürgens, Peter Ochsenschläger, Carsten Rudolph
    Abstractions Preserving Parameter Confidentiality. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2005, pp:418-437 [Conf]
  25. Fabio Massacci, John Mylopoulos, Nicola Zannone
    Minimal Disclosure in Hierarchical Hippocratic Databases with Delegation. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2005, pp:438-454 [Conf]
  26. Kristian Gjøsteen
    Security Notions for Disk Encryption. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2005, pp:455-474 [Conf]
  27. Marcin Gogolewski, Marek Klonowski, Miroslaw Kutylowski
    Local View Attack on Anonymous Communication. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2005, pp:475-488 [Conf]
  28. Thomas Groß, Birgit Pfitzmann, Ahmad-Reza Sadeghi
    Browser Model for Security Analysis of Browser-Based Protocols. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2005, pp:489-508 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002