


default search action
11th ESORICS 2006: Hamburg, Germany
- Dieter Gollmann, Jan Meier, Andrei Sabelfeld:

Computer Security - ESORICS 2006, 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings. Lecture Notes in Computer Science 4189, Springer 2006, ISBN 3-540-44601-X - Michael P. Collins, Michael K. Reiter:

Finding Peer-to-Peer File-Sharing Using Coarse Network Behaviors. 1-17 - Vitaly Shmatikov, Ming-Hsiu Wang:

Timing Analysis in Low-Latency Mix Networks: Attacks and Defenses. 18-33 - Milan Fort, Felix C. Freiling, Lucia Draque Penso, Zinaida Benenson, Dogan Kesdogan:

TrustedPals: Secure Multiparty Computation Implemented with Smart Cards. 34-48 - Shuhong Wang, Xuhua Ding

, Robert H. Deng
, Feng Bao:
Private Information Retrieval Using Trusted Hardware. 49-64 - Yuji Watanabe, Sachiko Yoshihama, Takuya Mishina, Michiharu Kudo, Hiroshi Maruyama:

Bridging the Gap Between Inter-communication Boundary and Internal Trusted Components. 65-80 - Cheun Ngen Chong, Sorin M. Iacob, R. Paul Koster, Javier Montaner, René van Buuren:

License Transfer in OMA-DRM. 81-96 - Abdellatif Benjelloun Touimi, Jean-Bernard Fischer, Caroline Fontaine, Christophe Giraud

, Michel Milhau:
Enhanced Security Architecture for Music Distribution on Mobile. 97-109 - Frédéric Besson, Guillaume Dufay, Thomas P. Jensen:

A Formal Model of Access Control for Mobile Interactive Devices. 110-126 - Philip W. L. Fong:

Discretionary Capability Confinement. 127-144 - Xibin Zhao, Kwok-Yan Lam, Guiming Luo, Siu Leung Chung, Ming Gu:

Minimal Threshold Closure. 145-155 - Hao Wang, Somesh Jha, Thomas W. Reps, Stefan Schwoon, Stuart G. Stubblebine:

Reducing the Dependence of SPKI/SDSI on PKI. 156-173 - Jason Crampton, Hemanth Khambhammettu:

Delegation in Role-Based Access Control. 174-191 - Daniel Mellado, Eduardo Fernández-Medina, Mario Piattini:

Applying a Security Requirements Engineering Process. 192-206 - Alex Hai Wang, Peng Liu:

Modeling and Evaluating the Survivability of an Intrusion Tolerant Database System. 207-224 - Thomas Santen:

A Formal Framework for Confidentiality-Preserving Refinement. 225-242 - Boris Köpf, David A. Basin:

Timing-Sensitive Information Flow Analysis for Synchronous Systems. 243-262 - Jing Wang, Yoshiaki Takata, Hiroyuki Seki:

HBAC: A Model for History-Based Access Control and Its Model Checking. 263-278 - David A. Naumann

:
From Coupling Relations to Mated Invariants for Checking Information Flow. 279-296 - Deepak Garg, Lujo Bauer

, Kevin D. Bowers, Frank Pfenning, Michael K. Reiter:
A Linear Logic of Authorization and Knowledge. 297-312 - Peter Y. A. Ryan, Steve A. Schneider:

Prêt à Voter with Re-encryption Mixes. 313-326 - Michael Backes, Christian Cachin, Alina Oprea:

Secure Key-Updating for Lazy Revocation. 327-346 - Mudhakar Srivatsa, Ling Liu:

Key Derivation Algorithms for Monotone Access Structures in Cryptographic File Systems. 347-361 - Michael Backes, Iliano Cervesato, Aaron D. Jaggard, Andre Scedrov, Joe-Kai Tsay:

Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos. 362-383 - Dusko Pavlovic, Catherine Meadows:

Deriving Secrecy in Key Establishment Protocols. 384-403 - Michael Backes, Birgit Pfitzmann, Michael Waidner

:
Limits of the BRSIM/UC Soundness of Dolev-Yao Models with Hashes. 404-423 - Michael Backes, Markus Dürmuth, Dennis Hofheinz, Ralf Küsters:

Conditional Reactive Simulatability. 424-443 - Martin Johns

:
SessionSafe: Implementing XSS Immune Session Handling. 444-460 - Ted Huffmire, Shreyas Prasad, Timothy Sherwood

, Ryan Kastner
:
Policy-Driven Memory Protection for Reconfigurable Hardware. 461-478 - Zhiqiang Yang, Sheng Zhong, Rebecca N. Wright:

Privacy-Preserving Queries on Encrypted Data. 479-495 - Joaquín García-Alfaro

, Frédéric Cuppens, Nora Cuppens-Boulahia:
Analysis of Policy Anomalies on Distributed Network Security Setups. 496-511 - Gabriel Maciá-Fernández, Jesús Esteban Díaz Verdejo, Pedro Garcia-Teodoro:

Assessment of a Vulnerability in Iterative Servers Enabling Low-Rate DoS Attacks. 512-526 - Guofei Gu, Prahlad Fogla, David Dagon, Wenke Lee, Boris Skoric:

Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems. 527-546

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














