ESORICS A

25 papers

YearTitle / Authors
1998A Flexible Method for Information System Security Policy Specification.
Rodolphe Ortalo
1998A Kernelized Architecture for Multilevel Secure Application Policies.
Simon N. Foley
1998A Mix-Mediated Anonymity Service and Its Payment.
Elke Franz, Anja Jerichow
1998A Sound Logic for Analysing Electronic Commerce Protocols.
Volker Kessler, Heike Neumann
1998A Subjective Metric of Authentication.
Audun Jøsang
1998A Tool for Pro-active Defense Against the Buffer Overrun Attack.
Danilo Bruschi, Emilia Rosti, R. Banfi
1998An Authorization Model and Its Formal Semantics.
Elisa Bertino, Francesco Buccafurri, Elena Ferrari, Pasquale Rullo
1998Authentication and Payment in Future Mobile Systems.
Günther Horn, Bart Preneel
1998Authorization in CORBA Security.
Günter Karjoth
1998Byte Code Verification for Java Smart Card Based on Model Checking.
Joachim Posegga, Harald Vogt
1998Computer Security - ESORICS 98, 5th European Symposium on Research in Computer Security, Louvain-la-Neuve, Belgium, September 16-18, 1998, Proceedings
Jean-Jacques Quisquater, Yves Deswarte, Catherine Meadows, Dieter Gollmann
1998DHWM: A Scheme for Managing Watermarking Keys in the Aquarelle Multimedia Distributed System.
Daniel Augot, Jean-François Delaigle, Caroline Fontaine
1998Dealing with Multi-policy Security in Large Open Distributed Systems.
Christophe Bidan, Valérie Issarny
1998Distributed Temporary Pseudonyms: A New Approach for Protecting Location Information in Mobile Communication Networks.
Dogan Kesdogan, Peter Reichl, Klaus Junghärtchen
1998EUROMED-JAVA: Trusted Third Party Services for Securing Medical Java Applets.
Angelos P. Varvitsiotis, Despina Polemi, Andy Marsh
1998Fixed vs. Variable-Length Patterns for Detecting Suspicious Process Behavior.
Hervé Debar, Marc Dacier, Mehdi Nassehi, Andreas Wespi
1998Kerberos Version 4: Inductive Analysis of the Secrecy Goals.
Giampaolo Bella, Lawrence C. Paulson
1998MPEG PTY-Marks: Cheap Detection of Embedded Copyright Data in DVD-Video.
Jean-Paul M. G. Linnartz, Joop Talstra
1998On the Security of Digital Tachographs.
Ross J. Anderson
1998On the Security of Some Variants of the RSA Signature Scheme.
Markus Michels, Markus Stadler, Hung-Min Sun
1998Panel Session: Watermarking.
Gérard Eizenberg, Jean-Jacques Quisquater
1998Rules for Designing Multilevel Object-Oriented Databases.
Frédéric Cuppens, Alban Gabillon
1998Side Channel Cryptanalysis of Product Ciphers.
John Kelsey, Bruce Schneier, David A. Wagner, Chris Hall
1998The "Ticket" Concept for Copy Control Based on Embedded Signalling.
Jean-Paul M. G. Linnartz
1998Towards Formalizing the Java Security Architecture of JDK 1.2.
Lora Kassab, Steven J. Greenwald