The following pages link to Computer Security – ESORICS 2006 (Q5862519):
Displaying 11 items.
- Private Information Retrieval Using Trusted Hardware (Q5862520) (← links)
- Delegation in Role-Based Access Control (Q5862522) (← links)
- Timing-Sensitive Information Flow Analysis for Synchronous Systems (Q5862523) (← links)
- A Linear Logic of Authorization and Knowledge (Q5862524) (← links)
- Secure Key-Updating for Lazy Revocation (Q5862525) (← links)
- Key Derivation Algorithms for Monotone Access Structures in Cryptographic File Systems (Q5862526) (← links)
- Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos (Q5862527) (← links)
- Limits of the BRSIM/UC Soundness of Dolev-Yao Models with Hashes (Q5862528) (← links)
- Conditional Reactive Simulatability (Q5862529) (← links)
- Privacy-Preserving Queries on Encrypted Data (Q5862530) (← links)
- Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems (Q5862531) (← links)