![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp for Publications
export results for "toc:db/conf/essos/essos2012.bht:"
@inproceedings{DBLP:conf/essos/BarbuHD12, author = {Guillaume Barbu and Philippe Hoogvorst and Guillaume Duc}, editor = {Gilles Barthe and Benjamin Livshits and Riccardo Scandariato}, title = {Application-Replay Attack on Java Cards: When the Garbage Collector Gets Confused}, booktitle = {Engineering Secure Software and Systems - 4th International Symposium, ESSoS 2012, Eindhoven, The Netherlands, February, 16-17, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7159}, pages = {1--13}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28166-2\_1}, doi = {10.1007/978-3-642-28166-2\_1}, timestamp = {Sat, 19 Oct 2019 20:24:21 +0200}, biburl = {https://dblp.org/rec/conf/essos/BarbuHD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/essos/BeckersFHKS12, author = {Kristian Beckers and Stephan Fa{\ss}bender and Maritta Heisel and Jan{-}Christoph K{\"{u}}ster and Holger Schmidt}, editor = {Gilles Barthe and Benjamin Livshits and Riccardo Scandariato}, title = {Supporting the Development and Documentation of {ISO} 27001 Information Security Management Systems through Security Requirements Engineering Approaches}, booktitle = {Engineering Secure Software and Systems - 4th International Symposium, ESSoS 2012, Eindhoven, The Netherlands, February, 16-17, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7159}, pages = {14--21}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28166-2\_2}, doi = {10.1007/978-3-642-28166-2\_2}, timestamp = {Fri, 24 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/essos/BeckersFHKS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/essos/BreuerB12, author = {Peter T. Breuer and Jonathan P. Bowen}, editor = {Gilles Barthe and Benjamin Livshits and Riccardo Scandariato}, title = {Typed Assembler for a {RISC} Crypto-Processor}, booktitle = {Engineering Secure Software and Systems - 4th International Symposium, ESSoS 2012, Eindhoven, The Netherlands, February, 16-17, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7159}, pages = {22--29}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28166-2\_3}, doi = {10.1007/978-3-642-28166-2\_3}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/essos/BreuerB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/essos/CasalinoPT12, author = {Matteo Maria Casalino and Henrik Plate and Slim Trabelsi}, editor = {Gilles Barthe and Benjamin Livshits and Riccardo Scandariato}, title = {Transversal Policy Conflict Detection}, booktitle = {Engineering Secure Software and Systems - 4th International Symposium, ESSoS 2012, Eindhoven, The Netherlands, February, 16-17, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7159}, pages = {30--37}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28166-2\_4}, doi = {10.1007/978-3-642-28166-2\_4}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/essos/CasalinoPT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/essos/GejiboMMVK12, author = {Samson Gejibo and Federico Mancini and Khalid A. Mughal and Remi Valvik and J{\o}rn Klungs{\o}yr}, editor = {Gilles Barthe and Benjamin Livshits and Riccardo Scandariato}, title = {Challenges in Implementing an End-to-End Secure Protocol for Java ME-Based Mobile Data Collection in Low-Budget Settings}, booktitle = {Engineering Secure Software and Systems - 4th International Symposium, ESSoS 2012, Eindhoven, The Netherlands, February, 16-17, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7159}, pages = {38--45}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28166-2\_5}, doi = {10.1007/978-3-642-28166-2\_5}, timestamp = {Tue, 02 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/essos/GejiboMMVK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/essos/KovacsS12, author = {M{\'{a}}t{\'{e}} Kov{\'{a}}cs and Helmut Seidl}, editor = {Gilles Barthe and Benjamin Livshits and Riccardo Scandariato}, title = {Runtime Enforcement of Information Flow Security in Tree Manipulating Processes}, booktitle = {Engineering Secure Software and Systems - 4th International Symposium, ESSoS 2012, Eindhoven, The Netherlands, February, 16-17, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7159}, pages = {46--59}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28166-2\_6}, doi = {10.1007/978-3-642-28166-2\_6}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/essos/KovacsS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/essos/MasiPT12, author = {Massimiliano Masi and Rosario Pugliese and Francesco Tiezzi}, editor = {Gilles Barthe and Benjamin Livshits and Riccardo Scandariato}, title = {Formalisation and Implementation of the {XACML} Access Control Mechanism}, booktitle = {Engineering Secure Software and Systems - 4th International Symposium, ESSoS 2012, Eindhoven, The Netherlands, February, 16-17, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7159}, pages = {60--74}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28166-2\_7}, doi = {10.1007/978-3-642-28166-2\_7}, timestamp = {Thu, 20 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/essos/MasiPT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/essos/MoyanoGAL12, author = {Francisco Moyano and M. Carmen Fern{\'{a}}ndez Gago and Isaac Agudo and Javier L{\'{o}}pez}, editor = {Gilles Barthe and Benjamin Livshits and Riccardo Scandariato}, title = {A Task Ordering Approach for Automatic Trust Establishment}, booktitle = {Engineering Secure Software and Systems - 4th International Symposium, ESSoS 2012, Eindhoven, The Netherlands, February, 16-17, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7159}, pages = {75--88}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28166-2\_8}, doi = {10.1007/978-3-642-28166-2\_8}, timestamp = {Thu, 04 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/essos/MoyanoGAL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/essos/NguyenM12, author = {Viet Hung Nguyen and Fabio Massacci}, editor = {Gilles Barthe and Benjamin Livshits and Riccardo Scandariato}, title = {An Idea of an Independent Validation of Vulnerability Discovery Models}, booktitle = {Engineering Secure Software and Systems - 4th International Symposium, ESSoS 2012, Eindhoven, The Netherlands, February, 16-17, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7159}, pages = {89--96}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28166-2\_9}, doi = {10.1007/978-3-642-28166-2\_9}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/essos/NguyenM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/essos/OchoaJW12, author = {Mart{\'{\i}}n Ochoa and Jan J{\"{u}}rjens and Daniel Warzecha}, editor = {Gilles Barthe and Benjamin Livshits and Riccardo Scandariato}, title = {A Sound Decision Procedure for the Compositionality of Secrecy}, booktitle = {Engineering Secure Software and Systems - 4th International Symposium, ESSoS 2012, Eindhoven, The Netherlands, February, 16-17, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7159}, pages = {97--105}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28166-2\_10}, doi = {10.1007/978-3-642-28166-2\_10}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/essos/OchoaJW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/essos/PotharajuNNZ12, author = {Rahul Potharaju and Andrew Newell and Cristina Nita{-}Rotaru and Xiangyu Zhang}, editor = {Gilles Barthe and Benjamin Livshits and Riccardo Scandariato}, title = {Plagiarizing Smartphone Applications: Attack Strategies and Defense Techniques}, booktitle = {Engineering Secure Software and Systems - 4th International Symposium, ESSoS 2012, Eindhoven, The Netherlands, February, 16-17, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7159}, pages = {106--120}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28166-2\_11}, doi = {10.1007/978-3-642-28166-2\_11}, timestamp = {Wed, 25 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/essos/PotharajuNNZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/essos/SaadatmandCS12, author = {Mehrdad Saadatmand and Antonio Cicchetti and Mikael Sj{\"{o}}din}, editor = {Gilles Barthe and Benjamin Livshits and Riccardo Scandariato}, title = {Design of Adaptive Security Mechanisms for Real-Time Embedded Systems}, booktitle = {Engineering Secure Software and Systems - 4th International Symposium, ESSoS 2012, Eindhoven, The Netherlands, February, 16-17, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7159}, pages = {121--134}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28166-2\_12}, doi = {10.1007/978-3-642-28166-2\_12}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/essos/SaadatmandCS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/essos/StergiopoulosTG12, author = {George Stergiopoulos and Bill Tsoumas and Dimitris Gritzalis}, editor = {Gilles Barthe and Benjamin Livshits and Riccardo Scandariato}, title = {Hunting Application-Level Logical Errors}, booktitle = {Engineering Secure Software and Systems - 4th International Symposium, ESSoS 2012, Eindhoven, The Netherlands, February, 16-17, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7159}, pages = {135--142}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28166-2\_13}, doi = {10.1007/978-3-642-28166-2\_13}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/essos/StergiopoulosTG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/essos/ZhuX12, author = {Huafei Zhu and Hong Xiao}, editor = {Gilles Barthe and Benjamin Livshits and Riccardo Scandariato}, title = {Optimal Trust Mining and Computing on Keyed MapReduce}, booktitle = {Engineering Secure Software and Systems - 4th International Symposium, ESSoS 2012, Eindhoven, The Netherlands, February, 16-17, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7159}, pages = {143--150}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28166-2\_14}, doi = {10.1007/978-3-642-28166-2\_14}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/essos/ZhuX12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/essos/2012, editor = {Gilles Barthe and Benjamin Livshits and Riccardo Scandariato}, title = {Engineering Secure Software and Systems - 4th International Symposium, ESSoS 2012, Eindhoven, The Netherlands, February, 16-17, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7159}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28166-2}, doi = {10.1007/978-3-642-28166-2}, isbn = {978-3-642-28165-5}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/essos/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.