Search dblp for Publications

export results for "toc:db/conf/esorics/esorics1994.bht:"

 download as .bib file

@inproceedings{DBLP:conf/esorics/Anderson94,
  author       = {Ross J. Anderson},
  title        = {Liability and Computer Security: Nine Principles},
  booktitle    = {Computer Security - {ESORICS} 94, Third European Symposium on Research
                  in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings},
  pages        = {231--245},
  year         = {1994},
  crossref     = {DBLP:conf/esorics/1994},
  url          = {https://doi.org/10.1007/3-540-58618-0\_67},
  doi          = {10.1007/3-540-58618-0\_67},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/Anderson94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/BanatreBM94,
  author       = {Jean{-}Pierre Ban{\^{a}}tre and
                  Ciar{\'{a}}n Bryce and
                  Daniel Le M{\'{e}}tayer},
  title        = {Compile-Time Detection of Information Flow in Sequential Programs},
  booktitle    = {Computer Security - {ESORICS} 94, Third European Symposium on Research
                  in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings},
  pages        = {55--73},
  year         = {1994},
  crossref     = {DBLP:conf/esorics/1994},
  url          = {https://doi.org/10.1007/3-540-58618-0\_56},
  doi          = {10.1007/3-540-58618-0\_56},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/BanatreBM94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/BethBK94,
  author       = {Thomas Beth and
                  Malte Borcherding and
                  Birgit Klein},
  title        = {Valuation of Trust in Open Networks},
  booktitle    = {Computer Security - {ESORICS} 94, Third European Symposium on Research
                  in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings},
  pages        = {3--18},
  year         = {1994},
  crossref     = {DBLP:conf/esorics/1994},
  url          = {https://doi.org/10.1007/3-540-58618-0\_53},
  doi          = {10.1007/3-540-58618-0\_53},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/BethBK94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/BolyBCMMMPPRSSVW94,
  author       = {Jean{-}Paul Boly and
                  Antoon Bosselaers and
                  Ronald Cramer and
                  Rolf Michelsen and
                  Stig Fr. Mj{\o}lsnes and
                  Frank Muller and
                  Torben P. Pedersen and
                  Birgit Pfitzmann and
                  Peter de Rooij and
                  Berry Schoenmakers and
                  Matthias Schunter and
                  Luc Vall{\'{e}}e and
                  Michael Waidner},
  title        = {The {ESPRIT} Project {CAFE} - High Security Digital Payment Systems},
  booktitle    = {Computer Security - {ESORICS} 94, Third European Symposium on Research
                  in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings},
  pages        = {217--230},
  year         = {1994},
  crossref     = {DBLP:conf/esorics/1994},
  url          = {https://doi.org/10.1007/3-540-58618-0\_66},
  doi          = {10.1007/3-540-58618-0\_66},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/BolyBCMMMPPRSSVW94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/Boulahia-CuppensCGY94,
  author       = {Nora Boulahia{-}Cuppens and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Alban Gabillon and
                  Kioumars Yazdanian},
  title        = {Decomposition of Multilevel Objects in an Object-Oriented Database},
  booktitle    = {Computer Security - {ESORICS} 94, Third European Symposium on Research
                  in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings},
  pages        = {375--402},
  year         = {1994},
  crossref     = {DBLP:conf/esorics/1994},
  url          = {https://doi.org/10.1007/3-540-58618-0\_75},
  doi          = {10.1007/3-540-58618-0\_75},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/Boulahia-CuppensCGY94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/BoydM94,
  author       = {Colin Boyd and
                  Wenbo Mao},
  title        = {Designing Secure Key Exchange Protocols},
  booktitle    = {Computer Security - {ESORICS} 94, Third European Symposium on Research
                  in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings},
  pages        = {93--105},
  year         = {1994},
  crossref     = {DBLP:conf/esorics/1994},
  url          = {https://doi.org/10.1007/3-540-58618-0\_58},
  doi          = {10.1007/3-540-58618-0\_58},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/BoydM94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/Calas94,
  author       = {Christel Calas},
  title        = {Distributed File System over a Multilevel Secure Architecture - Problems
                  and Solutions},
  booktitle    = {Computer Security - {ESORICS} 94, Third European Symposium on Research
                  in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings},
  pages        = {281--297},
  year         = {1994},
  crossref     = {DBLP:conf/esorics/1994},
  url          = {https://doi.org/10.1007/3-540-58618-0\_70},
  doi          = {10.1007/3-540-58618-0\_70},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/Calas94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/CamenischPS94,
  author       = {Jan Camenisch and
                  Jean{-}Marc Piveteau and
                  Markus Stadler},
  title        = {An Efficient Electronic Payment System Protecting Privacy},
  booktitle    = {Computer Security - {ESORICS} 94, Third European Symposium on Research
                  in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings},
  pages        = {207--215},
  year         = {1994},
  crossref     = {DBLP:conf/esorics/1994},
  url          = {https://doi.org/10.1007/3-540-58618-0\_65},
  doi          = {10.1007/3-540-58618-0\_65},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/CamenischPS94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/Chen94,
  author       = {Lidong Chen},
  title        = {Oblivious Signatures},
  booktitle    = {Computer Security - {ESORICS} 94, Third European Symposium on Research
                  in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings},
  pages        = {161--172},
  year         = {1994},
  crossref     = {DBLP:conf/esorics/1994},
  url          = {https://doi.org/10.1007/3-540-58618-0\_62},
  doi          = {10.1007/3-540-58618-0\_62},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/Chen94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/ChiampichettiBM94,
  author       = {Alessandro Ciampichetti and
                  Elisa Bertino and
                  Luigi V. Mancini},
  title        = {Mark-and-Sweep Garbage Collection in Multilevel Secure Object-Oriented
                  Database Systems},
  booktitle    = {Computer Security - {ESORICS} 94, Third European Symposium on Research
                  in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings},
  pages        = {359--373},
  year         = {1994},
  crossref     = {DBLP:conf/esorics/1994},
  url          = {https://doi.org/10.1007/3-540-58618-0\_74},
  doi          = {10.1007/3-540-58618-0\_74},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/ChiampichettiBM94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/CuppensT94,
  author       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Gilles Trouessin},
  title        = {Information Flow Controls vs Interference Controls: An Integrated
                  Approach},
  booktitle    = {Computer Security - {ESORICS} 94, Third European Symposium on Research
                  in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings},
  pages        = {447--468},
  year         = {1994},
  crossref     = {DBLP:conf/esorics/1994},
  url          = {https://doi.org/10.1007/3-540-58618-0\_78},
  doi          = {10.1007/3-540-58618-0\_78},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/CuppensT94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/DacierD94,
  author       = {Marc Dacier and
                  Yves Deswarte},
  title        = {Privilege Graph: an Extension to the Typed Access Matrix Model},
  booktitle    = {Computer Security - {ESORICS} 94, Third European Symposium on Research
                  in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings},
  pages        = {319--334},
  year         = {1994},
  crossref     = {DBLP:conf/esorics/1994},
  url          = {https://doi.org/10.1007/3-540-58618-0\_72},
  doi          = {10.1007/3-540-58618-0\_72},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/DacierD94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/HardjonoS94,
  author       = {Thomas Hardjono and
                  Jennifer Seberry},
  title        = {Authentication via Multi-Service Tickets in the Kuperee Server},
  booktitle    = {Computer Security - {ESORICS} 94, Third European Symposium on Research
                  in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings},
  pages        = {143--160},
  year         = {1994},
  crossref     = {DBLP:conf/esorics/1994},
  url          = {https://doi.org/10.1007/3-540-58618-0\_61},
  doi          = {10.1007/3-540-58618-0\_61},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/HardjonoS94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/HauserJMTH94,
  author       = {Ralf C. Hauser and
                  Philippe A. Janson and
                  Refik Molva and
                  Gene Tsudik and
                  Els Van Herreweghen},
  title        = {Robust and Secure Password and Key Change Method},
  booktitle    = {Computer Security - {ESORICS} 94, Third European Symposium on Research
                  in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings},
  pages        = {107--122},
  year         = {1994},
  crossref     = {DBLP:conf/esorics/1994},
  url          = {https://doi.org/10.1007/3-540-58618-0\_59},
  doi          = {10.1007/3-540-58618-0\_59},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/HauserJMTH94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/JiwaSZ94,
  author       = {Azad Jiwa and
                  Jennifer Seberry and
                  Yuliang Zheng},
  title        = {Beacon Based Authentication},
  booktitle    = {Computer Security - {ESORICS} 94, Third European Symposium on Research
                  in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings},
  pages        = {125--141},
  year         = {1994},
  crossref     = {DBLP:conf/esorics/1994},
  url          = {https://doi.org/10.1007/3-540-58618-0\_60},
  doi          = {10.1007/3-540-58618-0\_60},
  timestamp    = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/JiwaSZ94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/MaoB94,
  author       = {Wenbo Mao and
                  Colin Boyd},
  title        = {On Strengthening Authentication Protocols to Foil Cryptanalysis},
  booktitle    = {Computer Security - {ESORICS} 94, Third European Symposium on Research
                  in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings},
  pages        = {193--204},
  year         = {1994},
  crossref     = {DBLP:conf/esorics/1994},
  url          = {https://doi.org/10.1007/3-540-58618-0\_64},
  doi          = {10.1007/3-540-58618-0\_64},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/MaoB94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/MaurerS94,
  author       = {Ueli M. Maurer and
                  Pierre E. Schmid},
  title        = {A Calculus for Secure Channel Establishment in Open Networks},
  booktitle    = {Computer Security - {ESORICS} 94, Third European Symposium on Research
                  in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings},
  pages        = {175--192},
  year         = {1994},
  crossref     = {DBLP:conf/esorics/1994},
  url          = {https://doi.org/10.1007/3-540-58618-0\_63},
  doi          = {10.1007/3-540-58618-0\_63},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/MaurerS94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/MotroMJ94,
  author       = {Amihai Motro and
                  Donald G. Marks and
                  Sushil Jajodia},
  title        = {Aggregation in Relational Databases: Controlled Disclosure of Sensitive
                  Information},
  booktitle    = {Computer Security - {ESORICS} 94, Third European Symposium on Research
                  in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings},
  pages        = {431--445},
  year         = {1994},
  crossref     = {DBLP:conf/esorics/1994},
  url          = {https://doi.org/10.1007/3-540-58618-0\_77},
  doi          = {10.1007/3-540-58618-0\_77},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/MotroMJ94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/OHalloranS94,
  author       = {Colin O'Halloran and
                  Chris T. Sennett},
  title        = {Security Through Type Analysis},
  booktitle    = {Computer Security - {ESORICS} 94, Third European Symposium on Research
                  in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings},
  pages        = {75--89},
  year         = {1994},
  crossref     = {DBLP:conf/esorics/1994},
  url          = {https://doi.org/10.1007/3-540-58618-0\_57},
  doi          = {10.1007/3-540-58618-0\_57},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/OHalloranS94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/RobinsonW94,
  author       = {C. L. Robinson and
                  Simon R. Wiseman},
  title        = {A Consideration of the Modes of Operation for Secure Systems},
  booktitle    = {Computer Security - {ESORICS} 94, Third European Symposium on Research
                  in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings},
  pages        = {335--356},
  year         = {1994},
  crossref     = {DBLP:conf/esorics/1994},
  url          = {https://doi.org/10.1007/3-540-58618-0\_73},
  doi          = {10.1007/3-540-58618-0\_73},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/RobinsonW94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/RoscoeWW94,
  author       = {A. W. Roscoe and
                  Jim Woodcock and
                  Lars Wulf},
  title        = {Non-Interference Through Determinism},
  booktitle    = {Computer Security - {ESORICS} 94, Third European Symposium on Research
                  in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings},
  pages        = {33--53},
  year         = {1994},
  crossref     = {DBLP:conf/esorics/1994},
  url          = {https://doi.org/10.1007/3-540-58618-0\_55},
  doi          = {10.1007/3-540-58618-0\_55},
  timestamp    = {Fri, 17 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/RoscoeWW94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/SandhuG94,
  author       = {Ravi S. Sandhu and
                  Srinivas Ganta},
  title        = {On the Expressive Power of the Unary Transformation Model},
  booktitle    = {Computer Security - {ESORICS} 94, Third European Symposium on Research
                  in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings},
  pages        = {301--318},
  year         = {1994},
  crossref     = {DBLP:conf/esorics/1994},
  url          = {https://doi.org/10.1007/3-540-58618-0\_71},
  doi          = {10.1007/3-540-58618-0\_71},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/SandhuG94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/Sirond94,
  author       = {Pierre Siron and
                  Bruno d'Ausbourg},
  title        = {A Secure Medium Access Control Protocol: Security vs Performances},
  booktitle    = {Computer Security - {ESORICS} 94, Third European Symposium on Research
                  in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings},
  pages        = {267--279},
  year         = {1994},
  crossref     = {DBLP:conf/esorics/1994},
  url          = {https://doi.org/10.1007/3-540-58618-0\_69},
  doi          = {10.1007/3-540-58618-0\_69},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/Sirond94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/ThomasS94,
  author       = {Roshan K. Thomas and
                  Ravi S. Sandhu},
  title        = {Supporting Object-Based High-Assurance Write-up in Multilevel Databases
                  for the Replicated Architecture},
  booktitle    = {Computer Security - {ESORICS} 94, Third European Symposium on Research
                  in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings},
  pages        = {403--428},
  year         = {1994},
  crossref     = {DBLP:conf/esorics/1994},
  url          = {https://doi.org/10.1007/3-540-58618-0\_76},
  doi          = {10.1007/3-540-58618-0\_76},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/ThomasS94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/Zorkadis94,
  author       = {Vasilios Zorkadis},
  title        = {Security Versus Performance Requirements in Data Communications Systems},
  booktitle    = {Computer Security - {ESORICS} 94, Third European Symposium on Research
                  in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings},
  pages        = {19--30},
  year         = {1994},
  crossref     = {DBLP:conf/esorics/1994},
  url          = {https://doi.org/10.1007/3-540-58618-0\_54},
  doi          = {10.1007/3-540-58618-0\_54},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/Zorkadis94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/dAusbourg94,
  author       = {Bruno d'Ausbourg},
  title        = {Implementing Secure Dependencies over a Network by Designing a Distributed
                  Security SubSystem},
  booktitle    = {Computer Security - {ESORICS} 94, Third European Symposium on Research
                  in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings},
  pages        = {249--266},
  year         = {1994},
  crossref     = {DBLP:conf/esorics/1994},
  url          = {https://doi.org/10.1007/3-540-58618-0\_68},
  doi          = {10.1007/3-540-58618-0\_68},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/dAusbourg94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/1994,
  editor       = {Dieter Gollmann},
  title        = {Computer Security - {ESORICS} 94, Third European Symposium on Research
                  in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {875},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/3-540-58618-0},
  doi          = {10.1007/3-540-58618-0},
  isbn         = {3-540-58618-0},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/1994.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/1994,
  editor       = {Dieter Gollmann},
  title        = {Computer Security - {ESORICS} 94, Third European Symposium on Research
                  in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {875},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/3-540-58618-0},
  doi          = {10.1007/3-540-58618-0},
  isbn         = {3-540-58618-0},
  timestamp    = {Tue, 14 May 2024 01:48:13 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/1994.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics