Stop the war!
Остановите войну!
for scientists:
default search action
5th ESORICS 1998: Louvain-la-Neuve, Belgium
- Jean-Jacques Quisquater, Yves Deswarte, Catherine Meadows, Dieter Gollmann:
Computer Security - ESORICS 98, 5th European Symposium on Research in Computer Security, Louvain-la-Neuve, Belgium, September 16-18, 1998, Proceedings. Lecture Notes in Computer Science 1485, Springer 1998, ISBN 3-540-65004-0 - Hervé Debar, Marc Dacier, Mehdi Nassehi, Andreas Wespi:
Fixed vs. Variable-Length Patterns for Detecting Suspicious Process Behavior. 1-15 - Danilo Bruschi, Emilia Rosti, R. Banfi:
A Tool for Pro-active Defense Against the Buffer Overrun Attack. 17-31 - Simon N. Foley:
A Kernelized Architecture for Multilevel Secure Application Policies. 33-49 - Christophe Bidan, Valérie Issarny:
Dealing with Multi-policy Security in Large Open Distributed Systems. 51-66 - Rodolphe Ortalo:
A Flexible Method for Information System Security Policy Specification. 67-84 - Markus Michels, Markus Stadler, Hung-Min Sun:
On the Security of Some Variants of the RSA Signature Scheme. 85-96 - John Kelsey, Bruce Schneier, David A. Wagner, Chris Hall:
Side Channel Cryptanalysis of Product Ciphers. 97-110 - Ross J. Anderson:
On the Security of Digital Tachographs. 111-125 - Elisa Bertino, Francesco Buccafurri, Elena Ferrari, Pasquale Rullo:
An Authorization Model and Its Formal Semantics. 127-142 - Günter Karjoth:
Authorization in CORBA Security. 143-158 - Frédéric Cuppens, Alban Gabillon:
Rules for Designing Multilevel Object-Oriented Databases. 159-174 - Joachim Posegga, Harald Vogt:
Byte Code Verification for Java Smart Card Based on Model Checking. 175-190 - Lora Kassab, Steven J. Greenwald:
Towards Formalizing the Java Security Architecture of JDK 1.2. 191-207 - Angelos P. Varvitsiotis, Despina Polemi, Andy Marsh:
EUROMED-JAVA: Trusted Third Party Services for Securing Medical Java Applets. 209-220 - Jean-Paul M. G. Linnartz, Joop Talstra:
MPEG PTY-Marks: Cheap Detection of Embedded Copyright Data in DVD-Video. 221-240 - Daniel Augot, Jean-François Delaigle, Caroline Fontaine:
DHWM: A Scheme for Managing Watermarking Keys in the Aquarelle Multimedia Distributed System. 241-255 - Jean-Paul M. G. Linnartz:
The "Ticket" Concept for Copy Control Based on Embedded Signalling. 257-274 - Gérard Eizenberg, Jean-Jacques Quisquater:
Panel Session: Watermarking. 275 - Günther Horn, Bart Preneel:
Authentication and Payment in Future Mobile Systems. 277-293 - Dogan Kesdogan, Peter Reichl, Klaus Junghärtchen:
Distributed Temporary Pseudonyms: A New Approach for Protecting Location Information in Mobile Communication Networks. 295-312 - Elke Franz, Anja Jerichow:
A Mix-Mediated Anonymity Service and Its Payment. 313-327 - Audun Jøsang:
A Subjective Metric of Authentication. 329-344 - Volker Kessler, Heike Neumann:
A Sound Logic for Analysing Electronic Commerce Protocols. 345-360 - Giampaolo Bella, Lawrence C. Paulson:
Kerberos Version 4: Inductive Analysis of the Secrecy Goals. 361-375
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.