default search action
9th ESORICS 2004: Sophia Antipolis, French Riviera, France
- Pierangela Samarati, Peter Y. A. Ryan, Dieter Gollmann, Refik Molva:
Computer Security - ESORICS 2004, 9th European Symposium on Research Computer Security, Sophia Antipolis, France, September 13-15, 2004, Proceedings. Lecture Notes in Computer Science 3193, Springer 2004, ISBN 3-540-22987-6 - Shiping Chen, Duminda Wijesekera, Sushil Jajodia:
Incorporating Dynamic Constraints in the Flexible Authorization Framework. 1-16 - Naizhen Qi, Michiharu Kudo:
Access-Condition-Table-Driven Access Control for XML Databases. 17-32 - Michael Backes, Markus Dürmuth, Rainer Steinwandt:
An Algebra for Composing Enterprise Privacy Policies. 33-52 - Catherine Meadows, Dusko Pavlovic:
Deriving, Attacking and Defending the GDOI Protocol. 53-72 - Jan Camenisch:
Better Privacy for Trusted Computing Platforms: (Extended Abstract). 73-88 - Michael Backes:
A Cryptographically Sound Dolev-Yao Style Security Proof of the Otway-Rees Protocol. 89-108 - Sjouke Mauw, Jan Verschuren, Erik P. de Vink:
A Formalization of Anonymity and Onion Routing. 109-124 - Rainer Böhme, Andreas Westfeld:
Breaking Cauchy Model-Based JPEG Steganography with First Order Statistics. 125-140 - Claudia Díaz, Len Sassaman, Evelyne Dewitte:
Comparison Between Two Practical Mix Designs. 141-159 - Einar Mykletun, Maithili Narasimha, Gene Tsudik:
Signature Bouquets: Immutability for Aggregated/Condensed Signatures. 160-176 - James Aspnes, Joan Feigenbaum, Aleksandr Yampolskiy, Sheng Zhong:
Towards a Theory of Data Entanglement: (Extended Abstract). 177-192 - Mikhail J. Atallah, Marina Bykova:
Portable and Flexible Document Access Control Mechanisms. 193-208 - Dieter Hutter, Axel Schairer:
Possibilistic Information Flow Control in the Presence of Encrypted Communication. 209-224 - David von Oheimb:
Information Flow Control Revisited: Noninfluence = Noninterference + Nonleakage. 225-243 - Jon A. Solworth, Robert H. Sloan:
Security Property Based Administrative Controls. 244-259 - Indrajit Ray, Sudip Chakraborty:
A Vector Model of Trust for Developing Trustworthy Systems. 260-275 - Michael J. Covington, Mustaque Ahamad, Irfan A. Essa, H. Venkateswaran:
Parameterized Authentication. 276-292 - Seyit Ahmet Çamtepe, Bülent Yener:
Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks. 293-308 - Claude Castelluccia, Gabriel Montenegro, Julien Laganier, Christoph Neumann:
Hindering Eavesdropping via IPv6 Opportunistic Encryption. 309-321 - Lars R. Knudsen, John Erik Mathiassen:
On the Role of Key Schedules in Attacks on Iterated Ciphers. 322-334 - Bodo Möller:
A Public-Key Encryption Scheme with Pseudo-random Ciphertexts. 335-351 - Roberto Battistoni, Emanuele Gabrielli, Luigi V. Mancini:
A Host Intrusion Prevention System for Windows Operating Systems. 352-368 - Julian B. Grizzard, John G. Levine, Henry L. Owen:
Re-establishing Trust in Compromised Systems: Recovering from Rootkits That Trojan the System Call Table. 369-384 - Ramkumar Chinchani, Anusha Iyer, Bharat Jayaraman, Shambhu J. Upadhyaya:
ARCHERR: Runtime Environment Driven Program Safety. 385-406 - John McHugh:
Sets, Bags, and Rock and Roll: Analyzing Large Data Sets of Network Data. 407-422 - Bev Littlewood, Lorenzo Strigini:
Redundancy and Diversity in Security. 423-438 - Xinzhou Qin, Wenke Lee:
Discovering Novel Attack Strategies from INFOSEC Alerts. 439-456
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.