5. ESORICS 1998:
Louvain-la-Neuve,
Belgium
Jean-Jacques Quisquater, Yves Deswarte, Catherine Meadows, Dieter Gollmann (Eds.):
Computer Security - ESORICS 98, 5th European Symposium on Research in Computer Security, Louvain-la-Neuve, Belgium, September 16-18, 1998, Proceedings.
Lecture Notes in Computer Science 1485 Springer 1998, ISBN 3-540-65004-0 BibTeX
@proceedings{DBLP:conf/esorics/1998,
editor = {Jean-Jacques Quisquater and
Yves Deswarte and
Catherine Meadows and
Dieter Gollmann},
title = {Computer Security - ESORICS 98, 5th European Symposium on Research
in Computer Security, Louvain-la-Neuve, Belgium, September 16-18,
1998, Proceedings},
booktitle = {ESORICS},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
volume = {1485},
year = {1998},
isbn = {3-540-65004-0},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
- Hervé Debar, Marc Dacier, Mehdi Nassehi, Andreas Wespi:
Fixed vs. Variable-Length Patterns for Detecting Suspicious Process Behavior.
1-15
Electronic Edition (link) BibTeX
- Danilo Bruschi, Emilia Rosti, R. Banfi:
A Tool for Pro-active Defense Against the Buffer Overrun Attack.
17-31
Electronic Edition (link) BibTeX
- Simon N. Foley:
A Kernelized Architecture for Multilevel Secure Application Policies.
33-49
Electronic Edition (link) BibTeX
- Christophe Bidan, Valérie Issarny:
Dealing with Multi-policy Security in Large Open Distributed Systems.
51-66
Electronic Edition (link) BibTeX
- Rodolphe Ortalo:
A Flexible Method for Information System Security Policy Specification.
67-84
Electronic Edition (link) BibTeX
- Markus Michels, Markus Stadler, Hung-Min Sun:
On the Security of Some Variants of the RSA Signature Scheme.
85-96
Electronic Edition (link) BibTeX
- John Kelsey, Bruce Schneier, David Wagner, Chris Hall:
Side Channel Cryptanalysis of Product Ciphers.
97-110
Electronic Edition (link) BibTeX
- Ross J. Anderson:
On the Security of Digital Tachographs.
111-125
Electronic Edition (link) BibTeX
- Elisa Bertino, Francesco Buccafurri, Elena Ferrari, Pasquale Rullo:
An Authorization Model and Its Formal Semantics.
127-142
Electronic Edition (link) BibTeX
- Günter Karjoth:
Authorization in CORBA Security.
143-158
Electronic Edition (link) BibTeX
- Frédéric Cuppens, Alban Gabillon:
Rules for Designing Multilevel Object-Oriented Databases.
159-174
Electronic Edition (link) BibTeX
- Joachim Posegga, Harald Vogt:
Byte Code Verification for Java Smart Card Based on Model Checking.
175-190
Electronic Edition (link) BibTeX
- Lora Kassab, Steven J. Greenwald:
Towards Formalizing the Java Security Architecture of JDK 1.2.
191-207
Electronic Edition (link) BibTeX
- Angelos Varvitsiotis, Despina Polemi, Andy Marsh:
EUROMED-JAVA: Trusted Third Party Services for Securing Medical Java Applets.
209-220
Electronic Edition (link) BibTeX
- Jean-Paul M. G. Linnartz, Joop Talstra:
MPEG PTY-Marks: Cheap Detection of Embedded Copyright Data in DVD-Video.
221-240
Electronic Edition (link) BibTeX
- Daniel Augot, Jean-François Delaigle, Caroline Fontaine:
DHWM: A Scheme for Managing Watermarking Keys in the Aquarelle Multimedia Distributed System.
241-255
Electronic Edition (link) BibTeX
- Jean-Paul M. G. Linnartz:
The "Ticket" Concept for Copy Control Based on Embedded Signalling.
257-274
Electronic Edition (link) BibTeX
- Gérard Eizenberg, Jean-Jacques Quisquater:
Panel Session: Watermarking.
275
Electronic Edition (link) BibTeX
- Günther Horn, Bart Preneel:
Authentication and Payment in Future Mobile Systems.
277-293
Electronic Edition (link) BibTeX
- Dogan Kesdogan, Peter Reichl, Klaus Junghärtchen:
Distributed Temporary Pseudonyms: A New Approach for Protecting Location Information in Mobile Communication Networks.
295-312
Electronic Edition (link) BibTeX
- Elke Franz, Anja Jerichow:
A Mix-Mediated Anonymity Service and Its Payment.
313-327
Electronic Edition (link) BibTeX
- Audun Jøsang:
A Subjective Metric of Authentication.
329-344
Electronic Edition (link) BibTeX
- Volker Kessler, Heike Neumann:
A Sound Logic for Analysing Electronic Commerce Protocols.
345-360
Electronic Edition (link) BibTeX
- Giampaolo Bella, Lawrence C. Paulson:
Kerberos Version 4: Inductive Analysis of the Secrecy Goals.
361-375
Electronic Edition (link) BibTeX
Copyright © Sat May 16 23:10:52 2009
by Michael Ley (ley@uni-trier.de)