Computer Security ESORICS 2004 : 9th European Symposium on Research in Computer Security, Sophia Antipolis,
User Rating: Be the first one!
Author: European Symposium on Research in Computer Security (9th : 2004 : Sophia Antipolis, France), Samarati, Pierangela
Added by: sketch
Added Date: 2015-12-30
Language: eng
Subjects: Computer security, Sécurité informatique, Sécurité informatique
Publishers: Berlin ; New York : Springer
Collections: folkscanomy miscellaneous, folkscanomy, additional collections
ISBN Number: 3540229876, 9783540229872
Pages Count: 300
PPI Count: 300
PDF Count: 1
Total Size: 269.43 MB
PDF Size: 7.78 MB
Extensions: djvu, gif, pdf, gz, zip, torrent, log, mrc
Downloads: 502
Views: 552
Total Files: 18
Media Type: texts
Total Files: 5
TORRENT
springer 10 1007 b100085 archive torrent
Last Modified: 2022-03-09 09:48:17
Download
Size: 14.50 KB
Description
Computer Security – ESORICS 2004: 9th European Symposium on Research in Computer Security, Sophia Antipolis, France, September 13 - 15, 2004. Proceedings
Author: Pierangela Samarati, Peter Ryan, Dieter Gollmann, Refik Molva
Published by Springer Berlin Heidelberg
ISBN: 978-3-540-22987-2
DOI: 10.1007/b100085
Table of Contents:
Author: Pierangela Samarati, Peter Ryan, Dieter Gollmann, Refik Molva
Published by Springer Berlin Heidelberg
ISBN: 978-3-540-22987-2
DOI: 10.1007/b100085
Table of Contents:
- Incorporating Dynamic Constraints in the Flexible Authorization Framework
- Access-Condition-Table-Driven Access Control for XML Databases
- An Algebra for Composing Enterprise Privacy Policies
- Deriving, Attacking and Defending the GDOI Protocol
- Better Privacy for Trusted Computing Platforms
- A Cryptographically Sound Dolev-Yao Style Security Proof of the Otway-Rees Protocol
- A Formalization of Anonymity and Onion Routing
- Breaking Cauchy Model-Based JPEG Steganography with First Order Statistics
- Comparison Between Two Practical Mix Designs
- Signature Bouquets: Immutability for Aggregated/Condensed Signatures
- Towards a Theory of Data Entanglement
- Portable and Flexible Document Access Control Mechanisms
- Possibilistic Information Flow Control in the Presence of Encrypted Communication
- Information Flow Control Revisited: Noninfluence = Noninterference + Nonleakage
- Security Property Based Administrative Controls
- A Vector Model of Trust for Developing Trustworthy Systems
- Parameterized Authentication
- Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks
- Hindering Eavesdropping via IPv6 Opportunistic Encryption
- On the Role of Key Schedules in Attacks on Iterated Ciphers
You May Also Like
We will be happy to hear your thoughts