Computer Security -- ESORICS 2002 7th European Symposium on Research in Computer Security Zurich, Switzerland, October 14-16, 2002, Proceedings /

ESORICS, the European Symposium on Research in Computer Security, is the leading research-oriented conference on the theory and practice of computer security in Europe. It takes place every two years, at various locations throughout Europe, and is coordinated by an independent Steering Committee. ES...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Gollmann, Dieter (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt), Karjoth, Günter (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt), Waidner, Michael (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2002.
Έκδοση:1st ed. 2002.
Σειρά:Lecture Notes in Computer Science, 2502
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Computational Probabilistic Non-interference
  • Bit-Slice Auction Circuit
  • Confidentiality Policies and Their Enforcement for Controlled Query Evaluation
  • Cardinality-Based Inference Control in Sum-Only Data Cubes
  • Outbound Authentication for Programmable Secure Coprocessors
  • Hamming Weight Attacks on Cryptographic Hardware - Breaking Masking Defense
  • A Fully Compliant Research Implementation of the P3P Standard for Privacy Protection: Experiences and Recommendations
  • Authentication for Distributed Web Caches
  • Analysing a Stream Authentication Protocol Using Model Checking
  • Equal To The Task?
  • TINMAN: A Resource Bound Security Checking System for Mobile Code
  • Confidentiality-Preserving Refinement is Compositional - Sometimes
  • Formal Security Analysis with Interacting State Machines
  • Decidability of Safety in Graph-Based Models for Access Control
  • Inter-Packet Delay Based Correlation for Tracing Encrypted Connections through Stepping Stones
  • Learning Fingerprints for a Database Intrusion Detection System.