Volume 8,
Number 1,
2000
 Database Security XI (1997),
Part 2 
Volume 8,
Number 2/3,
2000
 
ESORICS 1998 
- Günter Karjoth:
Authorization in CORBA Security.
           
- Elisa Bertino, Francesco Buccafurri, Elena Ferrari, Pasquale Rullo:
A Logic-Based Approach for Enforcing Access Control.
           
- John Kelsey, Bruce Schneier, David Wagner, Chris Hall:
Side Channel Cryptanalysis of Product Ciphers.
           
- Andreas Wespi, Hervé Debar, Marc Dacier, Mehdi Nassehi:
Fixed- vs. Variable-Length Patterns for Detecting Suspicious Process Behavior.
           
- Günther Horn, Bart Preneel:
Authentication and Payment in Future Mobile Systems.
           
Volume 8,
Number 4,
2000
 13th IFIP Conf. on Database Security,
1999 
Copyright © Fri Mar 12 17:29:53 2010
 by Michael Ley (ley@uni-trier.de)