default search action
Search dblp for Publications
export results for "toc:db/conf/esorics/esorics2005.bht:"
@inproceedings{DBLP:conf/esorics/AdaoBHS05, author = {Pedro Ad{\~{a}}o and Gergei Bana and Jonathan Herzog and Andre Scedrov}, editor = {Sabrina De Capitani di Vimercati and Paul F. Syverson and Dieter Gollmann}, title = {Soundness of Formal Encryption in the Presence of Key-Cycles}, booktitle = {Computer Security - {ESORICS} 2005, 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3679}, pages = {374--396}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11555827\_22}, doi = {10.1007/11555827\_22}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/AdaoBHS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/AlbuquerqueKG05, author = {Jo{\~{a}}o Porto de Albuquerque and Heiko Krumm and Paulo L{\'{\i}}cio de Geus}, editor = {Sabrina De Capitani di Vimercati and Paul F. Syverson and Dieter Gollmann}, title = {On Scalability and Modularisation in the Modelling of Network Security Systems}, booktitle = {Computer Security - {ESORICS} 2005, 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3679}, pages = {287--304}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11555827\_17}, doi = {10.1007/11555827\_17}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/AlbuquerqueKG05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/AskarovS05, author = {Aslan Askarov and Andrei Sabelfeld}, editor = {Sabrina De Capitani di Vimercati and Paul F. Syverson and Dieter Gollmann}, title = {Security-Typed Languages for Implementation of Cryptographic Protocols: {A} Case Study}, booktitle = {Computer Security - {ESORICS} 2005, 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3679}, pages = {197--221}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11555827\_12}, doi = {10.1007/11555827\_12}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/AskarovS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/AtenieseCMT05, author = {Giuseppe Ateniese and Daniel H. Chou and Breno de Medeiros and Gene Tsudik}, editor = {Sabrina De Capitani di Vimercati and Paul F. Syverson and Dieter Gollmann}, title = {Sanitizable Signatures}, booktitle = {Computer Security - {ESORICS} 2005, 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3679}, pages = {159--177}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11555827\_10}, doi = {10.1007/11555827\_10}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/AtenieseCMT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/AtluriG05, author = {Vijayalakshmi Atluri and Qi Guo}, editor = {Sabrina De Capitani di Vimercati and Paul F. Syverson and Dieter Gollmann}, title = {Unified Index for Mobile Object Data and Authorizations}, booktitle = {Computer Security - {ESORICS} 2005, 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3679}, pages = {80--97}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11555827\_6}, doi = {10.1007/11555827\_6}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/AtluriG05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/Backes05, author = {Michael Backes}, editor = {Sabrina De Capitani di Vimercati and Paul F. Syverson and Dieter Gollmann}, title = {Quantifying Probabilistic Information Flow in Computational Reactive Systems}, booktitle = {Computer Security - {ESORICS} 2005, 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3679}, pages = {336--354}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11555827\_20}, doi = {10.1007/11555827\_20}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/Backes05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/BackesP05, author = {Michael Backes and Birgit Pfitzmann}, editor = {Sabrina De Capitani di Vimercati and Paul F. Syverson and Dieter Gollmann}, title = {Limits of the Cryptographic Realization of Dolev-Yao-Style {XOR}}, booktitle = {Computer Security - {ESORICS} 2005, 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3679}, pages = {178--196}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11555827\_11}, doi = {10.1007/11555827\_11}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/BackesP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/ChaumRS05, author = {David Chaum and Peter Y. A. Ryan and Steve A. Schneider}, editor = {Sabrina De Capitani di Vimercati and Paul F. Syverson and Dieter Gollmann}, title = {A Practical Voter-Verifiable Election Scheme}, booktitle = {Computer Security - {ESORICS} 2005, 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3679}, pages = {118--139}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11555827\_8}, doi = {10.1007/11555827\_8}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/ChaumRS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/CrescenzoGT05, author = {Giovanni Di Crescenzo and Abhrajit Ghosh and Rajesh Talpade}, editor = {Sabrina De Capitani di Vimercati and Paul F. Syverson and Dieter Gollmann}, title = {Towards a Theory of Intrusion Detection}, booktitle = {Computer Security - {ESORICS} 2005, 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3679}, pages = {267--286}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11555827\_16}, doi = {10.1007/11555827\_16}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/CrescenzoGT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/DanezisLKA05, author = {George Danezis and Chris Lesniewski{-}Laas and M. Frans Kaashoek and Ross J. Anderson}, editor = {Sabrina De Capitani di Vimercati and Paul F. Syverson and Dieter Gollmann}, title = {Sybil-Resistant {DHT} Routing}, booktitle = {Computer Security - {ESORICS} 2005, 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3679}, pages = {305--318}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11555827\_18}, doi = {10.1007/11555827\_18}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/DanezisLKA05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/FreilingHW05, author = {Felix C. Freiling and Thorsten Holz and Georg Wicherski}, editor = {Sabrina De Capitani di Vimercati and Paul F. Syverson and Dieter Gollmann}, title = {Botnet Tracking: Exploring a Root-Cause Methodology to Prevent Distributed Denial-of-Service Attacks}, booktitle = {Computer Security - {ESORICS} 2005, 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3679}, pages = {319--335}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11555827\_19}, doi = {10.1007/11555827\_19}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/FreilingHW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/Gjosteen05, author = {Kristian Gj{\o}steen}, editor = {Sabrina De Capitani di Vimercati and Paul F. Syverson and Dieter Gollmann}, title = {Security Notions for Disk Encryption}, booktitle = {Computer Security - {ESORICS} 2005, 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3679}, pages = {455--474}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11555827\_26}, doi = {10.1007/11555827\_26}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/Gjosteen05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/GogolewskiKK05, author = {Marcin Gogolewski and Marek Klonowski and Miroslaw Kutylowski}, editor = {Sabrina De Capitani di Vimercati and Paul F. Syverson and Dieter Gollmann}, title = {Local View Attack on Anonymous Communication}, booktitle = {Computer Security - {ESORICS} 2005, 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3679}, pages = {475--488}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11555827\_27}, doi = {10.1007/11555827\_27}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/GogolewskiKK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/GrossPS05, author = {Thomas Gro{\ss} and Birgit Pfitzmann and Ahmad{-}Reza Sadeghi}, editor = {Sabrina De Capitani di Vimercati and Paul F. Syverson and Dieter Gollmann}, title = {Browser Model for Security Analysis of Browser-Based Protocols}, booktitle = {Computer Security - {ESORICS} 2005, 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3679}, pages = {489--508}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11555827\_28}, doi = {10.1007/11555827\_28}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/GrossPS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/GuptaB05, author = {Rajeev Gupta and Manish Bhide}, editor = {Sabrina De Capitani di Vimercati and Paul F. Syverson and Dieter Gollmann}, title = {A Generic {XACML} Based Declarative Authorization Scheme for Java}, booktitle = {Computer Security - {ESORICS} 2005, 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3679}, pages = {44--63}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11555827\_4}, doi = {10.1007/11555827\_4}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/GuptaB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/GurgensOR05, author = {Sigrid G{\"{u}}rgens and Peter Ochsenschl{\"{a}}ger and Carsten Rudolph}, editor = {Sabrina De Capitani di Vimercati and Paul F. Syverson and Dieter Gollmann}, title = {Abstractions Preserving Parameter Confidentiality}, booktitle = {Computer Security - {ESORICS} 2005, 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3679}, pages = {418--437}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11555827\_24}, doi = {10.1007/11555827\_24}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/GurgensOR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/HiltyBP05, author = {Manuel Hilty and David A. Basin and Alexander Pretschner}, editor = {Sabrina De Capitani di Vimercati and Paul F. Syverson and Dieter Gollmann}, title = {On Obligations}, booktitle = {Computer Security - {ESORICS} 2005, 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3679}, pages = {98--117}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11555827\_7}, doi = {10.1007/11555827\_7}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/HiltyBP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/JhaKM05, author = {Somesh Jha and Louis Kruger and Patrick D. McDaniel}, editor = {Sabrina De Capitani di Vimercati and Paul F. Syverson and Dieter Gollmann}, title = {Privacy Preserving Clustering}, booktitle = {Computer Security - {ESORICS} 2005, 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3679}, pages = {397--417}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11555827\_23}, doi = {10.1007/11555827\_23}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/JhaKM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/LigattiBW05, author = {Jay Ligatti and Lujo Bauer and David Walker}, editor = {Sabrina De Capitani di Vimercati and Paul F. Syverson and Dieter Gollmann}, title = {Enforcing Non-safety Security Policies with Program Monitors}, booktitle = {Computer Security - {ESORICS} 2005, 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3679}, pages = {355--373}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11555827\_21}, doi = {10.1007/11555827\_21}, timestamp = {Mon, 08 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/LigattiBW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/MassacciMZ05, author = {Fabio Massacci and John Mylopoulos and Nicola Zannone}, editor = {Sabrina De Capitani di Vimercati and Paul F. Syverson and Dieter Gollmann}, title = {Minimal Disclosure in Hierarchical Hippocratic Databases with Delegation}, booktitle = {Computer Security - {ESORICS} 2005, 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3679}, pages = {438--454}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11555827\_25}, doi = {10.1007/11555827\_25}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/MassacciMZ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/QiK05, author = {Naizhen Qi and Michiharu Kudo}, editor = {Sabrina De Capitani di Vimercati and Paul F. Syverson and Dieter Gollmann}, title = {{XML} Access Control with Policy Matching Tree}, booktitle = {Computer Security - {ESORICS} 2005, 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3679}, pages = {3--23}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11555827\_2}, doi = {10.1007/11555827\_2}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/QiK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/RayP05, author = {Indrajit Ray and Nayot Poolsapassit}, editor = {Sabrina De Capitani di Vimercati and Paul F. Syverson and Dieter Gollmann}, title = {Using Attack Trees to Identify Malicious Attacks from Authorized Insiders}, booktitle = {Computer Security - {ESORICS} 2005, 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3679}, pages = {231--246}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11555827\_14}, doi = {10.1007/11555827\_14}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/RayP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/Simons05, author = {Barbara Simons}, editor = {Sabrina De Capitani di Vimercati and Paul F. Syverson and Dieter Gollmann}, title = {Computerized Voting Machines: {A} View from the Trenches}, booktitle = {Computer Security - {ESORICS} 2005, 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3679}, pages = {1--2}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11555827\_1}, doi = {10.1007/11555827\_1}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/Simons05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/SohrAGM05, author = {Karsten Sohr and Gail{-}Joon Ahn and Martin Gogolla and Lars Migge}, editor = {Sabrina De Capitani di Vimercati and Paul F. Syverson and Dieter Gollmann}, title = {Specification and Validation of Authorisation Constraints Using {UML} and {OCL}}, booktitle = {Computer Security - {ESORICS} 2005, 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3679}, pages = {64--79}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11555827\_5}, doi = {10.1007/11555827\_5}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/SohrAGM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/Tarento05, author = {Sabrina Tarento}, editor = {Sabrina De Capitani di Vimercati and Paul F. Syverson and Dieter Gollmann}, title = {Machine-Checked Security Proofs of Cryptographic Signature Schemes}, booktitle = {Computer Security - {ESORICS} 2005, 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3679}, pages = {140--158}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11555827\_9}, doi = {10.1007/11555827\_9}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/Tarento05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/ValleGM05, author = {Mariemma Inmaculada Yag{\"{u}}e del Valle and Mar{\'{\i}}a{-}del{-}Mar Gallardo and Antonio Mana}, editor = {Sabrina De Capitani di Vimercati and Paul F. Syverson and Dieter Gollmann}, title = {Semantic Access Control Model: {A} Formal Specification}, booktitle = {Computer Security - {ESORICS} 2005, 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3679}, pages = {24--43}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11555827\_3}, doi = {10.1007/11555827\_3}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/ValleGM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/WangLJ05, author = {Lingyu Wang and Anyi Liu and Sushil Jajodia}, editor = {Sabrina De Capitani di Vimercati and Paul F. Syverson and Dieter Gollmann}, title = {An Efficient and Unified Approach to Correlating, Hypothesizing, and Predicting Intrusion Alerts}, booktitle = {Computer Security - {ESORICS} 2005, 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3679}, pages = {247--266}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11555827\_15}, doi = {10.1007/11555827\_15}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/WangLJ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/ZhuB05, author = {Huafei Zhu and Feng Bao}, editor = {Sabrina De Capitani di Vimercati and Paul F. Syverson and Dieter Gollmann}, title = {Augmented Oblivious Polynomial Evaluation Protocol and Its Applications}, booktitle = {Computer Security - {ESORICS} 2005, 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3679}, pages = {222--230}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11555827\_13}, doi = {10.1007/11555827\_13}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/ZhuB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esorics/2005, editor = {Sabrina De Capitani di Vimercati and Paul F. Syverson and Dieter Gollmann}, title = {Computer Security - {ESORICS} 2005, 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3679}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11555827}, doi = {10.1007/11555827}, isbn = {3-540-28963-1}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.