default search action
7th ESORICS 2002: Zurich, Switzerland
- Dieter Gollmann, Günter Karjoth, Michael Waidner:
Computer Security - ESORICS 2002, 7th European Symposium on Research in Computer Security, Zurich, Switzerland, October 14-16, 2002, Proceedings. Lecture Notes in Computer Science 2502, Springer 2002, ISBN 3-540-44345-2 - Michael Backes, Birgit Pfitzmann:
Computational Probabilistic Non-interference. 1-23 - Kaoru Kurosawa, Wakaha Ogata:
Bit-Slice Auction Circuit. 24-38 - Joachim Biskup, Piero A. Bonatti:
Confidentiality Policies and Their Enforcement for Controlled Query Evaluation. 39-54 - Lingyu Wang, Duminda Wijesekera, Sushil Jajodia:
Cardinality-Based Inference Control in Sum-Only Data Cubes. 55-71 - Sean W. Smith:
Outbound Authentication for Programmable Secure Coprocessors. 72-89 - Marcin Gomulkiewicz, Miroslaw Kutylowski:
Hamming Weight Attacks on Cryptographic Hardware - Breaking Masking Defense. 90-103 - Giles Hogben, Tom Jackson, Marc Wilikens:
A Fully Compliant Research Implementation of the P3P Standard for Privacy Protection: Experiences and Recommendations. 104-125 - James Giles, Reiner Sailer, Dinesh C. Verma, Suresh Chari:
Authentication for Distributed Web Caches. 126-145 - Philippa J. Broadfoot, Gavin Lowe:
Analysing a Stream Authentication Protocol Using Model Checking. 146-161 - James Heather, Steve A. Schneider:
Equal To The Task? 162-177 - Aloysius K. Mok, Weijiang Yu:
TINMAN: A Resource Bound Security Checking System for Mobile Code. 178-193 - Thomas Santen, Maritta Heisel, Andreas Pfitzmann:
Confidentiality-Preserving Refinement is Compositional - Sometimes. 194-211 - David von Oheimb, Volkmar Lotz:
Formal Security Analysis with Interacting State Machines. 212-228 - Manuel Koch, Luigi V. Mancini, Francesco Parisi-Presicce:
Decidability of Safety in Graph-Based Models for Access Control. 229-243 - Xinyuan Wang, Douglas S. Reeves, Shyhtsun Felix Wu:
Inter-Packet Delay Based Correlation for Tracing Encrypted Connections through Stepping Stones. 244-263 - Sin Yeung Lee, Wai Lup Low, Pei Yuen Wong:
Learning Fingerprints for a Database Intrusion Detection System. 264-280
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.