![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
15. ESORICS 2010: Athens, Greece - DPM/SETOP
- Joaquín García-Alfaro
, Guillermo Navarro-Arribas
, Ana R. Cavalli, Jean Leneutre:
Data Privacy Management and Autonomous Spontaneous Security - 5th International Workshop, DPM 2010 and 3rd International Workshop, SETOP 2010, Athens, Greece, September 23, 2010, Revised Selected Papers. Lecture Notes in Computer Science 6514, Springer 2011, ISBN 978-3-642-19347-7
Keynote Talks
- Vicenç Torra
:
Towards Knowledge Intensive Data Privacy. 1-7 - Sabrina De Capitani di Vimercati
, Sara Foresti
, Giovanni Livraga
:
Privacy in Data Publishing. 8-21
Data Privacy Management
- Shinsaku Kiyomoto, Toshiaki Tanaka:
A User-Oriented Anonymization Mechanism for Public Data. 22-35 - Hessam Zakerzadeh, Sylvia L. Osborn:
FAANST: Fast Anonymizing Algorithm for Numerical Streaming DaTa. 36-50 - Johannes Wolkerstorfer:
Secret-Sharing Hardware Improves the Privacy of Network Monitoring. 51-63 - Ali Özhan Gürel, Atakan Arslan, Mete Akgün:
Non-uniform Stepping Approach to RFID Distance Bounding Problem. 64-78 - Arnau Vives-Guasch, Magdalena Payeras-Capellà
, Macià Mut Puigserver, Jordi Castellà-Roca
:
E-Ticketing Scheme for Mobile Devices with Exculpability. 79-92 - Florian Kammüller:
Privacy Enforcement and Analysis for Functional Active Objects. 93-107 - Almudena Alcaide, Ali E. Abdallah, Ana Isabel González-Tablas Ferreres
, José María de Fuentes
:
L-PEP: A Logic to Reason about Privacy-Enhancing Cryptography Protocols. 108-122 - Vasilios Katos
, Frank Stowell, Peter M. Bednar
:
Surveillance, Privacy and the Law of Requisite Variety. 123-139 - Kunihiko Fujita, Yasuyuki Tsukada
:
A Notation for Policies Using Feature Structures. 140-154
Autonomous and Spontaneous Security
- Nouha Oualha
, Yves Roudier:
Securing P2P Storage with a Self-organizing Payment Scheme. 155-169 - Zonghua Zhang, Jingwei Liu
, Youki Kadobayashi:
STARS: A Simple and Efficient Scheme for Providing Transparent Traceability and Anonymity to Reputation Systems. 170-187 - Wendy M. Maiden, Ioanna Dionysiou
, Deborah A. Frincke, Glenn A. Fink
, David E. Bakken:
DualTrust: A Distributed Trust Model for Swarm-Based Autonomic Computing Systems. 188-202 - Joaquín García-Alfaro
, Frédéric Cuppens, Nora Cuppens-Boulahia, Stere Preda:
MIRAGE: A Management Tool for the Analysis and Deployment of Network Security Policies. 203-215 - Ruan He, Marc Lacoste, Jacques Pulou, Jean Leneutre:
A DSL for Specifying Autonomic Security Management Strategies. 216-230 - Albert Fernàndez-Mir, Jordi Castellà-Roca
, Alexandre Viejo
:
Secure and Scalable RFID Authentication Protocol. 231-243 - Hedi Benzina, Jean Goubault-Larrecq:
Some Ideas on Virtualized System Security, and Monitors. 244-258
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.