Stop the war!
Остановите войну!
for scientists:
default search action
10th ESORICS 2005: Milan, Italy
- Sabrina De Capitani di Vimercati, Paul F. Syverson, Dieter Gollmann:
Computer Security - ESORICS 2005, 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings. Lecture Notes in Computer Science 3679, Springer 2005, ISBN 3-540-28963-1 - Barbara Simons:
Computerized Voting Machines: A View from the Trenches. 1-2 - Naizhen Qi, Michiharu Kudo:
XML Access Control with Policy Matching Tree. 3-23 - Mariemma Inmaculada Yagüe del Valle, María-del-Mar Gallardo, Antonio Mana:
Semantic Access Control Model: A Formal Specification. 24-43 - Rajeev Gupta, Manish Bhide:
A Generic XACML Based Declarative Authorization Scheme for Java. 44-63 - Karsten Sohr, Gail-Joon Ahn, Martin Gogolla, Lars Migge:
Specification and Validation of Authorisation Constraints Using UML and OCL. 64-79 - Vijayalakshmi Atluri, Qi Guo:
Unified Index for Mobile Object Data and Authorizations. 80-97 - Manuel Hilty, David A. Basin, Alexander Pretschner:
On Obligations. 98-117 - David Chaum, Peter Y. A. Ryan, Steve A. Schneider:
A Practical Voter-Verifiable Election Scheme. 118-139 - Sabrina Tarento:
Machine-Checked Security Proofs of Cryptographic Signature Schemes. 140-158 - Giuseppe Ateniese, Daniel H. Chou, Breno de Medeiros, Gene Tsudik:
Sanitizable Signatures. 159-177 - Michael Backes, Birgit Pfitzmann:
Limits of the Cryptographic Realization of Dolev-Yao-Style XOR. 178-196 - Aslan Askarov, Andrei Sabelfeld:
Security-Typed Languages for Implementation of Cryptographic Protocols: A Case Study. 197-221 - Huafei Zhu, Feng Bao:
Augmented Oblivious Polynomial Evaluation Protocol and Its Applications. 222-230 - Indrajit Ray, Nayot Poolsapassit:
Using Attack Trees to Identify Malicious Attacks from Authorized Insiders. 231-246 - Lingyu Wang, Anyi Liu, Sushil Jajodia:
An Efficient and Unified Approach to Correlating, Hypothesizing, and Predicting Intrusion Alerts. 247-266 - Giovanni Di Crescenzo, Abhrajit Ghosh, Rajesh Talpade:
Towards a Theory of Intrusion Detection. 267-286 - João Porto de Albuquerque, Heiko Krumm, Paulo Lício de Geus:
On Scalability and Modularisation in the Modelling of Network Security Systems. 287-304 - George Danezis, Chris Lesniewski-Laas, M. Frans Kaashoek, Ross J. Anderson:
Sybil-Resistant DHT Routing. 305-318 - Felix C. Freiling, Thorsten Holz, Georg Wicherski:
Botnet Tracking: Exploring a Root-Cause Methodology to Prevent Distributed Denial-of-Service Attacks. 319-335 - Michael Backes:
Quantifying Probabilistic Information Flow in Computational Reactive Systems. 336-354 - Jay Ligatti, Lujo Bauer, David Walker:
Enforcing Non-safety Security Policies with Program Monitors. 355-373 - Pedro Adão, Gergei Bana, Jonathan Herzog, Andre Scedrov:
Soundness of Formal Encryption in the Presence of Key-Cycles. 374-396 - Somesh Jha, Louis Kruger, Patrick D. McDaniel:
Privacy Preserving Clustering. 397-417 - Sigrid Gürgens, Peter Ochsenschläger, Carsten Rudolph:
Abstractions Preserving Parameter Confidentiality. 418-437 - Fabio Massacci, John Mylopoulos, Nicola Zannone:
Minimal Disclosure in Hierarchical Hippocratic Databases with Delegation. 438-454 - Kristian Gjøsteen:
Security Notions for Disk Encryption. 455-474 - Marcin Gogolewski, Marek Klonowski, Miroslaw Kutylowski:
Local View Attack on Anonymous Communication. 475-488 - Thomas Groß, Birgit Pfitzmann, Ahmad-Reza Sadeghi:
Browser Model for Security Analysis of Browser-Based Protocols. 489-508
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.