|
Conferences in DBLP
- Barbara Simons
Computerized Voting Machines: A View from the Trenches. [Citation Graph (0, 0)][DBLP] ESORICS, 2005, pp:1-2 [Conf]
- Naizhen Qi, Michiharu Kudo
XML Access Control with Policy Matching Tree. [Citation Graph (0, 0)][DBLP] ESORICS, 2005, pp:3-23 [Conf]
- Mariemma Inmaculada Yagüe del Valle, María-del-Mar Gallardo, Antonio Mana
Semantic Access Control Model: A Formal Specification. [Citation Graph (0, 0)][DBLP] ESORICS, 2005, pp:24-43 [Conf]
- Rajeev Gupta, Manish Bhide
A Generic XACML Based Declarative Authorization Scheme for Java. [Citation Graph (0, 0)][DBLP] ESORICS, 2005, pp:44-63 [Conf]
- Karsten Sohr, Gail-Joon Ahn, Martin Gogolla, Lars Migge
Specification and Validation of Authorisation Constraints Using UML and OCL. [Citation Graph (0, 0)][DBLP] ESORICS, 2005, pp:64-79 [Conf]
- Vijayalakshmi Atluri, Qi Guo
Unified Index for Mobile Object Data and Authorizations. [Citation Graph (0, 0)][DBLP] ESORICS, 2005, pp:80-97 [Conf]
- Manuel Hilty, David A. Basin, Alexander Pretschner
On Obligations. [Citation Graph (0, 0)][DBLP] ESORICS, 2005, pp:98-117 [Conf]
- David Chaum, Peter Y. A. Ryan, Steve A. Schneider
A Practical Voter-Verifiable Election Scheme. [Citation Graph (0, 0)][DBLP] ESORICS, 2005, pp:118-139 [Conf]
- Sabrina Tarento
Machine-Checked Security Proofs of Cryptographic Signature Schemes. [Citation Graph (0, 0)][DBLP] ESORICS, 2005, pp:140-158 [Conf]
- Giuseppe Ateniese, Daniel H. Chou, Breno de Medeiros, Gene Tsudik
Sanitizable Signatures. [Citation Graph (0, 0)][DBLP] ESORICS, 2005, pp:159-177 [Conf]
- Michael Backes, Birgit Pfitzmann
Limits of the Cryptographic Realization of Dolev-Yao-Style XOR. [Citation Graph (0, 0)][DBLP] ESORICS, 2005, pp:178-196 [Conf]
- Aslan Askarov, Andrei Sabelfeld
Security-Typed Languages for Implementation of Cryptographic Protocols: A Case Study. [Citation Graph (0, 0)][DBLP] ESORICS, 2005, pp:197-221 [Conf]
- Huafei Zhu, Feng Bao
Augmented Oblivious Polynomial Evaluation Protocol and Its Applications. [Citation Graph (0, 0)][DBLP] ESORICS, 2005, pp:222-230 [Conf]
- Indrajit Ray, Nayot Poolsapassit
Using Attack Trees to Identify Malicious Attacks from Authorized Insiders. [Citation Graph (0, 0)][DBLP] ESORICS, 2005, pp:231-246 [Conf]
- Lingyu Wang, Anyi Liu, Sushil Jajodia
An Efficient and Unified Approach to Correlating, Hypothesizing, and Predicting Intrusion Alerts. [Citation Graph (0, 0)][DBLP] ESORICS, 2005, pp:247-266 [Conf]
- Giovanni Di Crescenzo, Abhrajit Ghosh, Rajesh Talpade
Towards a Theory of Intrusion Detection. [Citation Graph (0, 0)][DBLP] ESORICS, 2005, pp:267-286 [Conf]
- João Porto de Albuquerque, Heiko Krumm, Paulo Lício de Geus
On Scalability and Modularisation in the Modelling of Network Security Systems. [Citation Graph (0, 0)][DBLP] ESORICS, 2005, pp:287-304 [Conf]
- George Danezis, Chris Lesniewski-Laas, M. Frans Kaashoek, Ross J. Anderson
Sybil-Resistant DHT Routing. [Citation Graph (0, 0)][DBLP] ESORICS, 2005, pp:305-318 [Conf]
- Felix C. Freiling, Thorsten Holz, Georg Wicherski
Botnet Tracking: Exploring a Root-Cause Methodology to Prevent Distributed Denial-of-Service Attacks. [Citation Graph (0, 0)][DBLP] ESORICS, 2005, pp:319-335 [Conf]
- Michael Backes
Quantifying Probabilistic Information Flow in Computational Reactive Systems. [Citation Graph (0, 0)][DBLP] ESORICS, 2005, pp:336-354 [Conf]
- Jay Ligatti, Lujo Bauer, David Walker
Enforcing Non-safety Security Policies with Program Monitors. [Citation Graph (0, 0)][DBLP] ESORICS, 2005, pp:355-373 [Conf]
- Pedro Adão, Gergei Bana, Jonathan Herzog, Andre Scedrov
Soundness of Formal Encryption in the Presence of Key-Cycles. [Citation Graph (0, 0)][DBLP] ESORICS, 2005, pp:374-396 [Conf]
- Somesh Jha, Louis Kruger, Patrick McDaniel
Privacy Preserving Clustering. [Citation Graph (0, 0)][DBLP] ESORICS, 2005, pp:397-417 [Conf]
- Sigrid Gürgens, Peter Ochsenschläger, Carsten Rudolph
Abstractions Preserving Parameter Confidentiality. [Citation Graph (0, 0)][DBLP] ESORICS, 2005, pp:418-437 [Conf]
- Fabio Massacci, John Mylopoulos, Nicola Zannone
Minimal Disclosure in Hierarchical Hippocratic Databases with Delegation. [Citation Graph (0, 0)][DBLP] ESORICS, 2005, pp:438-454 [Conf]
- Kristian Gjøsteen
Security Notions for Disk Encryption. [Citation Graph (0, 0)][DBLP] ESORICS, 2005, pp:455-474 [Conf]
- Marcin Gogolewski, Marek Klonowski, Miroslaw Kutylowski
Local View Attack on Anonymous Communication. [Citation Graph (0, 0)][DBLP] ESORICS, 2005, pp:475-488 [Conf]
- Thomas Groß, Birgit Pfitzmann, Ahmad-Reza Sadeghi
Browser Model for Security Analysis of Browser-Based Protocols. [Citation Graph (0, 0)][DBLP] ESORICS, 2005, pp:489-508 [Conf]
|