


default search action
7th ESORICS 2002: Zurich, Switzerland
- Dieter Gollmann, Günter Karjoth, Michael Waidner:

Computer Security - ESORICS 2002, 7th European Symposium on Research in Computer Security, Zurich, Switzerland, October 14-16, 2002, Proceedings. Lecture Notes in Computer Science 2502, Springer 2002, ISBN 3-540-44345-2 - Michael Backes, Birgit Pfitzmann:

Computational Probabilistic Non-interference. 1-23 - Kaoru Kurosawa, Wakaha Ogata

:
Bit-Slice Auction Circuit. 24-38 - Joachim Biskup, Piero A. Bonatti:

Confidentiality Policies and Their Enforcement for Controlled Query Evaluation. 39-54 - Lingyu Wang, Duminda Wijesekera, Sushil Jajodia:

Cardinality-Based Inference Control in Sum-Only Data Cubes. 55-71 - Sean W. Smith:

Outbound Authentication for Programmable Secure Coprocessors. 72-89 - Marcin Gomulkiewicz, Miroslaw Kutylowski:

Hamming Weight Attacks on Cryptographic Hardware - Breaking Masking Defense. 90-103 - Giles Hogben, Tom Jackson, Marc Wilikens:

A Fully Compliant Research Implementation of the P3P Standard for Privacy Protection: Experiences and Recommendations. 104-125 - James Giles, Reiner Sailer, Dinesh C. Verma

, Suresh Chari:
Authentication for Distributed Web Caches. 126-145 - Philippa J. Broadfoot, Gavin Lowe:

Analysing a Stream Authentication Protocol Using Model Checking. 146-161 - James Heather, Steve A. Schneider:

Equal To The Task? 162-177 - Aloysius K. Mok, Weijiang Yu:

TINMAN: A Resource Bound Security Checking System for Mobile Code. 178-193 - Thomas Santen, Maritta Heisel, Andreas Pfitzmann:

Confidentiality-Preserving Refinement is Compositional - Sometimes. 194-211 - David von Oheimb, Volkmar Lotz:

Formal Security Analysis with Interacting State Machines. 212-228 - Manuel Koch, Luigi V. Mancini, Francesco Parisi-Presicce:

Decidability of Safety in Graph-Based Models for Access Control. 229-243 - Xinyuan Wang, Douglas S. Reeves, Shyhtsun Felix Wu:

Inter-Packet Delay Based Correlation for Tracing Encrypted Connections through Stepping Stones. 244-263 - Sin Yeung Lee, Wai Lup Low, Pei Yuen Wong:

Learning Fingerprints for a Database Intrusion Detection System. 264-280

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














