7. ESORICS 2002:
Zurich,
Switzerland
Dieter Gollmann, Günter Karjoth, Michael Waidner (Eds.):
Computer Security - ESORICS 2002, 7th European Symposium on Research in Computer Security, Zurich, Switzerland, October 14-16, 2002, Proceedings.
Lecture Notes in Computer Science 2502 Springer 2002, ISBN 3-540-44345-2 @proceedings{DBLP:conf/esorics/2002,
editor = {Dieter Gollmann and
G{\"u}nter Karjoth and
Michael Waidner},
title = {Computer Security - ESORICS 2002, 7th European Symposium on Research
in Computer Security, Zurich, Switzerland, October 14-16, 2002,
Proceedings},
booktitle = {ESORICS},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
volume = {2502},
year = {2002},
isbn = {3-540-44345-2},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
- Michael Backes, Birgit Pfitzmann:
Computational Probabilistic Non-interference.
1-23
- Kaoru Kurosawa, Wakaha Ogata:
Bit-Slice Auction Circuit.
24-38
- Joachim Biskup, Piero A. Bonatti:
Confidentiality Policies and Their Enforcement for Controlled Query Evaluation.
39-54
- Lingyu Wang, Duminda Wijesekera, Sushil Jajodia:
Cardinality-Based Inference Control in Sum-Only Data Cubes.
55-71
- Sean W. Smith:
Outbound Authentication for Programmable Secure Coprocessors.
72-89
- Marcin Gomulkiewicz, Miroslaw Kutylowski:
Hamming Weight Attacks on Cryptographic Hardware - Breaking Masking Defense.
90-103
- Giles Hogben, Tom Jackson, Marc Wilikens:
A Fully Compliant Research Implementation of the P3P Standard for Privacy Protection: Experiences and Recommendations.
104-125
- James Giles, Reiner Sailer, Dinesh C. Verma, Suresh Chari:
Authentication for Distributed Web Caches.
126-145
- Philippa J. Broadfoot, Gavin Lowe:
Analysing a Stream Authentication Protocol Using Model Checking.
146-161
- James Heather, Steve Schneider:
Equal To The Task?
162-177
- Aloysius K. Mok, Weijiang Yu:
TINMAN: A Resource Bound Security Checking System for Mobile Code.
178-193
- Thomas Santen, Maritta Heisel, Andreas Pfitzmann:
Confidentiality-Preserving Refinement is Compositional - Sometimes.
194-211
- David von Oheimb, Volkmar Lotz:
Formal Security Analysis with Interacting State Machines.
212-228
- Manuel Koch, Luigi V. Mancini, Francesco Parisi-Presicce:
Decidability of Safety in Graph-Based Models for Access Control.
229-243
- Xinyuan Wang, Douglas S. Reeves, Shyhtsun Felix Wu:
Inter-Packet Delay Based Correlation for Tracing Encrypted Connections through Stepping Stones.
244-263
- Sin Yeung Lee, Wai Lup Low, Pei Yuen Wong:
Learning Fingerprints for a Database Intrusion Detection System.
264-280
Copyright © Sun Mar 14 23:02:56 2010
by Michael Ley (ley@uni-trier.de)