Volume 8,
Number 1,
2000
Database Security XI (1997),
Part 2
Volume 8,
Number 2/3,
2000
ESORICS 1998
- Günter Karjoth:
Authorization in CORBA Security.
- Elisa Bertino, Francesco Buccafurri, Elena Ferrari, Pasquale Rullo:
A Logic-Based Approach for Enforcing Access Control.
- John Kelsey, Bruce Schneier, David Wagner, Chris Hall:
Side Channel Cryptanalysis of Product Ciphers.
- Andreas Wespi, Hervé Debar, Marc Dacier, Mehdi Nassehi:
Fixed- vs. Variable-Length Patterns for Detecting Suspicious Process Behavior.
- Günther Horn, Bart Preneel:
Authentication and Payment in Future Mobile Systems.
Volume 8,
Number 4,
2000
13th IFIP Conf. on Database Security,
1999
Copyright © Fri Mar 12 17:29:53 2010
by Michael Ley (ley@uni-trier.de)