Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/esorics/esorics1994.bht:"
@inproceedings{DBLP:conf/esorics/Anderson94, author = {Ross J. Anderson}, title = {Liability and Computer Security: Nine Principles}, booktitle = {Computer Security - {ESORICS} 94, Third European Symposium on Research in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings}, pages = {231--245}, year = {1994}, crossref = {DBLP:conf/esorics/1994}, url = {https://doi.org/10.1007/3-540-58618-0\_67}, doi = {10.1007/3-540-58618-0\_67}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/esorics/Anderson94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/BanatreBM94, author = {Jean{-}Pierre Ban{\^{a}}tre and Ciar{\'{a}}n Bryce and Daniel Le M{\'{e}}tayer}, title = {Compile-Time Detection of Information Flow in Sequential Programs}, booktitle = {Computer Security - {ESORICS} 94, Third European Symposium on Research in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings}, pages = {55--73}, year = {1994}, crossref = {DBLP:conf/esorics/1994}, url = {https://doi.org/10.1007/3-540-58618-0\_56}, doi = {10.1007/3-540-58618-0\_56}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/BanatreBM94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/BethBK94, author = {Thomas Beth and Malte Borcherding and Birgit Klein}, title = {Valuation of Trust in Open Networks}, booktitle = {Computer Security - {ESORICS} 94, Third European Symposium on Research in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings}, pages = {3--18}, year = {1994}, crossref = {DBLP:conf/esorics/1994}, url = {https://doi.org/10.1007/3-540-58618-0\_53}, doi = {10.1007/3-540-58618-0\_53}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/BethBK94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/BolyBCMMMPPRSSVW94, author = {Jean{-}Paul Boly and Antoon Bosselaers and Ronald Cramer and Rolf Michelsen and Stig Fr. Mj{\o}lsnes and Frank Muller and Torben P. Pedersen and Birgit Pfitzmann and Peter de Rooij and Berry Schoenmakers and Matthias Schunter and Luc Vall{\'{e}}e and Michael Waidner}, title = {The {ESPRIT} Project {CAFE} - High Security Digital Payment Systems}, booktitle = {Computer Security - {ESORICS} 94, Third European Symposium on Research in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings}, pages = {217--230}, year = {1994}, crossref = {DBLP:conf/esorics/1994}, url = {https://doi.org/10.1007/3-540-58618-0\_66}, doi = {10.1007/3-540-58618-0\_66}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/BolyBCMMMPPRSSVW94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/Boulahia-CuppensCGY94, author = {Nora Boulahia{-}Cuppens and Fr{\'{e}}d{\'{e}}ric Cuppens and Alban Gabillon and Kioumars Yazdanian}, title = {Decomposition of Multilevel Objects in an Object-Oriented Database}, booktitle = {Computer Security - {ESORICS} 94, Third European Symposium on Research in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings}, pages = {375--402}, year = {1994}, crossref = {DBLP:conf/esorics/1994}, url = {https://doi.org/10.1007/3-540-58618-0\_75}, doi = {10.1007/3-540-58618-0\_75}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/Boulahia-CuppensCGY94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/BoydM94, author = {Colin Boyd and Wenbo Mao}, title = {Designing Secure Key Exchange Protocols}, booktitle = {Computer Security - {ESORICS} 94, Third European Symposium on Research in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings}, pages = {93--105}, year = {1994}, crossref = {DBLP:conf/esorics/1994}, url = {https://doi.org/10.1007/3-540-58618-0\_58}, doi = {10.1007/3-540-58618-0\_58}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/BoydM94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/Calas94, author = {Christel Calas}, title = {Distributed File System over a Multilevel Secure Architecture - Problems and Solutions}, booktitle = {Computer Security - {ESORICS} 94, Third European Symposium on Research in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings}, pages = {281--297}, year = {1994}, crossref = {DBLP:conf/esorics/1994}, url = {https://doi.org/10.1007/3-540-58618-0\_70}, doi = {10.1007/3-540-58618-0\_70}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/Calas94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/CamenischPS94, author = {Jan Camenisch and Jean{-}Marc Piveteau and Markus Stadler}, title = {An Efficient Electronic Payment System Protecting Privacy}, booktitle = {Computer Security - {ESORICS} 94, Third European Symposium on Research in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings}, pages = {207--215}, year = {1994}, crossref = {DBLP:conf/esorics/1994}, url = {https://doi.org/10.1007/3-540-58618-0\_65}, doi = {10.1007/3-540-58618-0\_65}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/CamenischPS94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/Chen94, author = {Lidong Chen}, title = {Oblivious Signatures}, booktitle = {Computer Security - {ESORICS} 94, Third European Symposium on Research in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings}, pages = {161--172}, year = {1994}, crossref = {DBLP:conf/esorics/1994}, url = {https://doi.org/10.1007/3-540-58618-0\_62}, doi = {10.1007/3-540-58618-0\_62}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/Chen94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/ChiampichettiBM94, author = {Alessandro Ciampichetti and Elisa Bertino and Luigi V. Mancini}, title = {Mark-and-Sweep Garbage Collection in Multilevel Secure Object-Oriented Database Systems}, booktitle = {Computer Security - {ESORICS} 94, Third European Symposium on Research in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings}, pages = {359--373}, year = {1994}, crossref = {DBLP:conf/esorics/1994}, url = {https://doi.org/10.1007/3-540-58618-0\_74}, doi = {10.1007/3-540-58618-0\_74}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/ChiampichettiBM94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/CuppensT94, author = {Fr{\'{e}}d{\'{e}}ric Cuppens and Gilles Trouessin}, title = {Information Flow Controls vs Interference Controls: An Integrated Approach}, booktitle = {Computer Security - {ESORICS} 94, Third European Symposium on Research in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings}, pages = {447--468}, year = {1994}, crossref = {DBLP:conf/esorics/1994}, url = {https://doi.org/10.1007/3-540-58618-0\_78}, doi = {10.1007/3-540-58618-0\_78}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/CuppensT94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/DacierD94, author = {Marc Dacier and Yves Deswarte}, title = {Privilege Graph: an Extension to the Typed Access Matrix Model}, booktitle = {Computer Security - {ESORICS} 94, Third European Symposium on Research in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings}, pages = {319--334}, year = {1994}, crossref = {DBLP:conf/esorics/1994}, url = {https://doi.org/10.1007/3-540-58618-0\_72}, doi = {10.1007/3-540-58618-0\_72}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/DacierD94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/HardjonoS94, author = {Thomas Hardjono and Jennifer Seberry}, title = {Authentication via Multi-Service Tickets in the Kuperee Server}, booktitle = {Computer Security - {ESORICS} 94, Third European Symposium on Research in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings}, pages = {143--160}, year = {1994}, crossref = {DBLP:conf/esorics/1994}, url = {https://doi.org/10.1007/3-540-58618-0\_61}, doi = {10.1007/3-540-58618-0\_61}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/HardjonoS94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/HauserJMTH94, author = {Ralf C. Hauser and Philippe A. Janson and Refik Molva and Gene Tsudik and Els Van Herreweghen}, title = {Robust and Secure Password and Key Change Method}, booktitle = {Computer Security - {ESORICS} 94, Third European Symposium on Research in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings}, pages = {107--122}, year = {1994}, crossref = {DBLP:conf/esorics/1994}, url = {https://doi.org/10.1007/3-540-58618-0\_59}, doi = {10.1007/3-540-58618-0\_59}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/HauserJMTH94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/JiwaSZ94, author = {Azad Jiwa and Jennifer Seberry and Yuliang Zheng}, title = {Beacon Based Authentication}, booktitle = {Computer Security - {ESORICS} 94, Third European Symposium on Research in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings}, pages = {125--141}, year = {1994}, crossref = {DBLP:conf/esorics/1994}, url = {https://doi.org/10.1007/3-540-58618-0\_60}, doi = {10.1007/3-540-58618-0\_60}, timestamp = {Tue, 30 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/JiwaSZ94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/MaoB94, author = {Wenbo Mao and Colin Boyd}, title = {On Strengthening Authentication Protocols to Foil Cryptanalysis}, booktitle = {Computer Security - {ESORICS} 94, Third European Symposium on Research in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings}, pages = {193--204}, year = {1994}, crossref = {DBLP:conf/esorics/1994}, url = {https://doi.org/10.1007/3-540-58618-0\_64}, doi = {10.1007/3-540-58618-0\_64}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/MaoB94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/MaurerS94, author = {Ueli M. Maurer and Pierre E. Schmid}, title = {A Calculus for Secure Channel Establishment in Open Networks}, booktitle = {Computer Security - {ESORICS} 94, Third European Symposium on Research in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings}, pages = {175--192}, year = {1994}, crossref = {DBLP:conf/esorics/1994}, url = {https://doi.org/10.1007/3-540-58618-0\_63}, doi = {10.1007/3-540-58618-0\_63}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/MaurerS94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/MotroMJ94, author = {Amihai Motro and Donald G. Marks and Sushil Jajodia}, title = {Aggregation in Relational Databases: Controlled Disclosure of Sensitive Information}, booktitle = {Computer Security - {ESORICS} 94, Third European Symposium on Research in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings}, pages = {431--445}, year = {1994}, crossref = {DBLP:conf/esorics/1994}, url = {https://doi.org/10.1007/3-540-58618-0\_77}, doi = {10.1007/3-540-58618-0\_77}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/MotroMJ94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/OHalloranS94, author = {Colin O'Halloran and Chris T. Sennett}, title = {Security Through Type Analysis}, booktitle = {Computer Security - {ESORICS} 94, Third European Symposium on Research in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings}, pages = {75--89}, year = {1994}, crossref = {DBLP:conf/esorics/1994}, url = {https://doi.org/10.1007/3-540-58618-0\_57}, doi = {10.1007/3-540-58618-0\_57}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/OHalloranS94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/RobinsonW94, author = {C. L. Robinson and Simon R. Wiseman}, title = {A Consideration of the Modes of Operation for Secure Systems}, booktitle = {Computer Security - {ESORICS} 94, Third European Symposium on Research in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings}, pages = {335--356}, year = {1994}, crossref = {DBLP:conf/esorics/1994}, url = {https://doi.org/10.1007/3-540-58618-0\_73}, doi = {10.1007/3-540-58618-0\_73}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/RobinsonW94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/RoscoeWW94, author = {A. W. Roscoe and Jim Woodcock and Lars Wulf}, title = {Non-Interference Through Determinism}, booktitle = {Computer Security - {ESORICS} 94, Third European Symposium on Research in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings}, pages = {33--53}, year = {1994}, crossref = {DBLP:conf/esorics/1994}, url = {https://doi.org/10.1007/3-540-58618-0\_55}, doi = {10.1007/3-540-58618-0\_55}, timestamp = {Fri, 17 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/RoscoeWW94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/SandhuG94, author = {Ravi S. Sandhu and Srinivas Ganta}, title = {On the Expressive Power of the Unary Transformation Model}, booktitle = {Computer Security - {ESORICS} 94, Third European Symposium on Research in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings}, pages = {301--318}, year = {1994}, crossref = {DBLP:conf/esorics/1994}, url = {https://doi.org/10.1007/3-540-58618-0\_71}, doi = {10.1007/3-540-58618-0\_71}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/SandhuG94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/Sirond94, author = {Pierre Siron and Bruno d'Ausbourg}, title = {A Secure Medium Access Control Protocol: Security vs Performances}, booktitle = {Computer Security - {ESORICS} 94, Third European Symposium on Research in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings}, pages = {267--279}, year = {1994}, crossref = {DBLP:conf/esorics/1994}, url = {https://doi.org/10.1007/3-540-58618-0\_69}, doi = {10.1007/3-540-58618-0\_69}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/Sirond94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/ThomasS94, author = {Roshan K. Thomas and Ravi S. Sandhu}, title = {Supporting Object-Based High-Assurance Write-up in Multilevel Databases for the Replicated Architecture}, booktitle = {Computer Security - {ESORICS} 94, Third European Symposium on Research in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings}, pages = {403--428}, year = {1994}, crossref = {DBLP:conf/esorics/1994}, url = {https://doi.org/10.1007/3-540-58618-0\_76}, doi = {10.1007/3-540-58618-0\_76}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/ThomasS94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/Zorkadis94, author = {Vasilios Zorkadis}, title = {Security Versus Performance Requirements in Data Communications Systems}, booktitle = {Computer Security - {ESORICS} 94, Third European Symposium on Research in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings}, pages = {19--30}, year = {1994}, crossref = {DBLP:conf/esorics/1994}, url = {https://doi.org/10.1007/3-540-58618-0\_54}, doi = {10.1007/3-540-58618-0\_54}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/Zorkadis94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/dAusbourg94, author = {Bruno d'Ausbourg}, title = {Implementing Secure Dependencies over a Network by Designing a Distributed Security SubSystem}, booktitle = {Computer Security - {ESORICS} 94, Third European Symposium on Research in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings}, pages = {249--266}, year = {1994}, crossref = {DBLP:conf/esorics/1994}, url = {https://doi.org/10.1007/3-540-58618-0\_68}, doi = {10.1007/3-540-58618-0\_68}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/dAusbourg94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esorics/1994, editor = {Dieter Gollmann}, title = {Computer Security - {ESORICS} 94, Third European Symposium on Research in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {875}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/3-540-58618-0}, doi = {10.1007/3-540-58618-0}, isbn = {3-540-58618-0}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/1994.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esorics/1994, editor = {Dieter Gollmann}, title = {Computer Security - {ESORICS} 94, Third European Symposium on Research in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {875}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/3-540-58618-0}, doi = {10.1007/3-540-58618-0}, isbn = {3-540-58618-0}, timestamp = {Tue, 14 May 2024 01:48:13 +0200}, biburl = {https://dblp.org/rec/conf/esorics/1994.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.