2. ESORICS 1992: Toulouse, France

Access Control

Formal Methods

Invited Talk

Authentication 1

Distributed Systems

Authentication 2

Database Security

System Architectures

Applications

a service of Schloss Dagstuhl - Leibniz Center for Informatics