ESORICS A

17 papers

YearTitle / Authors
2002A Fully Compliant Research Implementation of the P3P Standard for Privacy Protection: Experiences and Recommendations.
Giles Hogben, Tom Jackson, Marc Wilikens
2002Analysing a Stream Authentication Protocol Using Model Checking.
Philippa J. Broadfoot, Gavin Lowe
2002Authentication for Distributed Web Caches.
James Giles, Reiner Sailer, Dinesh C. Verma, Suresh Chari
2002Bit-Slice Auction Circuit.
Kaoru Kurosawa, Wakaha Ogata
2002Cardinality-Based Inference Control in Sum-Only Data Cubes.
Lingyu Wang, Duminda Wijesekera, Sushil Jajodia
2002Computational Probabilistic Non-interference.
Michael Backes, Birgit Pfitzmann
2002Computer Security - ESORICS 2002, 7th European Symposium on Research in Computer Security, Zurich, Switzerland, October 14-16, 2002, Proceedings
Dieter Gollmann, Günter Karjoth, Michael Waidner
2002Confidentiality Policies and Their Enforcement for Controlled Query Evaluation.
Joachim Biskup, Piero A. Bonatti
2002Confidentiality-Preserving Refinement is Compositional - Sometimes.
Thomas Santen, Maritta Heisel, Andreas Pfitzmann
2002Decidability of Safety in Graph-Based Models for Access Control.
Manuel Koch, Luigi V. Mancini, Francesco Parisi-Presicce
2002Equal To The Task?
James Heather, Steve A. Schneider
2002Formal Security Analysis with Interacting State Machines.
David von Oheimb, Volkmar Lotz
2002Hamming Weight Attacks on Cryptographic Hardware - Breaking Masking Defense.
Marcin Gomulkiewicz, Miroslaw Kutylowski
2002Inter-Packet Delay Based Correlation for Tracing Encrypted Connections through Stepping Stones.
Xinyuan Wang, Douglas S. Reeves, Shyhtsun Felix Wu
2002Learning Fingerprints for a Database Intrusion Detection System.
Sin Yeung Lee, Wai Lup Low, Pei Yuen Wong
2002Outbound Authentication for Programmable Secure Coprocessors.
Sean W. Smith
2002TINMAN: A Resource Bound Security Checking System for Mobile Code.
Aloysius K. Mok, Weijiang Yu