10. ICICS 2008:
Birmingham,
UK
Liqun Chen, Mark Dermot Ryan, Guilin Wang (Eds.):
Information and Communications Security, 10th International Conference, ICICS 2008, Birmingham, UK, October 20-22, 2008, Proceedings.
Lecture Notes in Computer Science 5308 Springer 2008, ISBN 978-3-540-88624-2 BibTeX
Invited Talk
Authentication
Side Channel Analysis
Cryptanalysis
Access Control
- Mohamed Shehab, Anna Cinzia Squicciarini, Gail-Joon Ahn:
Beyond User-to-User Access Control for Online Social Networks.
174-189
Electronic Edition (link) BibTeX
- Meriam Ben-Ghorbel-Talbi, Frédéric Cuppens, Nora Cuppens-Boulahia, Adel Bouhoula:
Revocation Schemes for Delegation Licences.
190-205
Electronic Edition (link) BibTeX
- Z. Cliffe Schreuders, Christian Payne:
Reusability of Functionality-Based Application Confinement Policy Abstractions.
206-221
Electronic Edition (link) BibTeX
- Gang Yin, Huaimin Wang, Jian-quan Ouyang, Ning Zhou, Dian-xi Shi:
Towards Role Based Trust Management without Distributed Searching of Credentials.
222-237
Electronic Edition (link) BibTeX
Software Security
System Security
Applied Cryptography
Security Protocols
Copyright © Sat May 16 23:19:55 2009
by Michael Ley (ley@uni-trier.de)