default search action
11th ESORICS 2006: Hamburg, Germany
- Dieter Gollmann, Jan Meier, Andrei Sabelfeld:
Computer Security - ESORICS 2006, 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings. Lecture Notes in Computer Science 4189, Springer 2006, ISBN 3-540-44601-X - Michael P. Collins, Michael K. Reiter:
Finding Peer-to-Peer File-Sharing Using Coarse Network Behaviors. 1-17 - Vitaly Shmatikov, Ming-Hsiu Wang:
Timing Analysis in Low-Latency Mix Networks: Attacks and Defenses. 18-33 - Milan Fort, Felix C. Freiling, Lucia Draque Penso, Zinaida Benenson, Dogan Kesdogan:
TrustedPals: Secure Multiparty Computation Implemented with Smart Cards. 34-48 - Shuhong Wang, Xuhua Ding, Robert H. Deng, Feng Bao:
Private Information Retrieval Using Trusted Hardware. 49-64 - Yuji Watanabe, Sachiko Yoshihama, Takuya Mishina, Michiharu Kudo, Hiroshi Maruyama:
Bridging the Gap Between Inter-communication Boundary and Internal Trusted Components. 65-80 - Cheun Ngen Chong, Sorin M. Iacob, R. Paul Koster, Javier Montaner, René van Buuren:
License Transfer in OMA-DRM. 81-96 - Abdellatif Benjelloun Touimi, Jean-Bernard Fischer, Caroline Fontaine, Christophe Giraud, Michel Milhau:
Enhanced Security Architecture for Music Distribution on Mobile. 97-109 - Frédéric Besson, Guillaume Dufay, Thomas P. Jensen:
A Formal Model of Access Control for Mobile Interactive Devices. 110-126 - Philip W. L. Fong:
Discretionary Capability Confinement. 127-144 - Xibin Zhao, Kwok-Yan Lam, Guiming Luo, Siu Leung Chung, Ming Gu:
Minimal Threshold Closure. 145-155 - Hao Wang, Somesh Jha, Thomas W. Reps, Stefan Schwoon, Stuart G. Stubblebine:
Reducing the Dependence of SPKI/SDSI on PKI. 156-173 - Jason Crampton, Hemanth Khambhammettu:
Delegation in Role-Based Access Control. 174-191 - Daniel Mellado, Eduardo Fernández-Medina, Mario Piattini:
Applying a Security Requirements Engineering Process. 192-206 - Alex Hai Wang, Peng Liu:
Modeling and Evaluating the Survivability of an Intrusion Tolerant Database System. 207-224 - Thomas Santen:
A Formal Framework for Confidentiality-Preserving Refinement. 225-242 - Boris Köpf, David A. Basin:
Timing-Sensitive Information Flow Analysis for Synchronous Systems. 243-262 - Jing Wang, Yoshiaki Takata, Hiroyuki Seki:
HBAC: A Model for History-Based Access Control and Its Model Checking. 263-278 - David A. Naumann:
From Coupling Relations to Mated Invariants for Checking Information Flow. 279-296 - Deepak Garg, Lujo Bauer, Kevin D. Bowers, Frank Pfenning, Michael K. Reiter:
A Linear Logic of Authorization and Knowledge. 297-312 - Peter Y. A. Ryan, Steve A. Schneider:
Prêt à Voter with Re-encryption Mixes. 313-326 - Michael Backes, Christian Cachin, Alina Oprea:
Secure Key-Updating for Lazy Revocation. 327-346 - Mudhakar Srivatsa, Ling Liu:
Key Derivation Algorithms for Monotone Access Structures in Cryptographic File Systems. 347-361 - Michael Backes, Iliano Cervesato, Aaron D. Jaggard, Andre Scedrov, Joe-Kai Tsay:
Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos. 362-383 - Dusko Pavlovic, Catherine Meadows:
Deriving Secrecy in Key Establishment Protocols. 384-403 - Michael Backes, Birgit Pfitzmann, Michael Waidner:
Limits of the BRSIM/UC Soundness of Dolev-Yao Models with Hashes. 404-423 - Michael Backes, Markus Dürmuth, Dennis Hofheinz, Ralf Küsters:
Conditional Reactive Simulatability. 424-443 - Martin Johns:
SessionSafe: Implementing XSS Immune Session Handling. 444-460 - Ted Huffmire, Shreyas Prasad, Timothy Sherwood, Ryan Kastner:
Policy-Driven Memory Protection for Reconfigurable Hardware. 461-478 - Zhiqiang Yang, Sheng Zhong, Rebecca N. Wright:
Privacy-Preserving Queries on Encrypted Data. 479-495 - Joaquín García-Alfaro, Frédéric Cuppens, Nora Cuppens-Boulahia:
Analysis of Policy Anomalies on Distributed Network Security Setups. 496-511 - Gabriel Maciá-Fernández, Jesús Esteban Díaz Verdejo, Pedro Garcia-Teodoro:
Assessment of a Vulnerability in Iterative Servers Enabling Low-Rate DoS Attacks. 512-526 - Guofei Gu, Prahlad Fogla, David Dagon, Wenke Lee, Boris Skoric:
Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems. 527-546
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.