The following pages link to Computer Security – ESORICS 2005 (Q5862658):
Displayed 14 items.
- XML Access Control with Policy Matching Tree (Q5862659) (← links)
- Semantic Access Control Model: A Formal Specification (Q5862660) (← links)
- On Obligations (Q5862662) (← links)
- Machine-Checked Security Proofs of Cryptographic Signature Schemes (Q5862663) (← links)
- Sanitizable Signatures (Q5862665) (← links)
- Limits of the Cryptographic Realization of Dolev-Yao-Style XOR (Q5862666) (← links)
- Augmented Oblivious Polynomial Evaluation Protocol and Its Applications (Q5862667) (← links)
- Towards a Theory of Intrusion Detection (Q5862669) (← links)
- Quantifying Probabilistic Information Flow in Computational Reactive Systems (Q5862670) (← links)
- Enforcing Non-safety Security Policies with Program Monitors (Q5862671) (← links)
- Soundness of Formal Encryption in the Presence of Key-Cycles (Q5862672) (← links)
- Abstractions Preserving Parameter Confidentiality (Q5862673) (← links)
- Minimal Disclosure in Hierarchical Hippocratic Databases with Delegation (Q5862674) (← links)
- Security Notions for Disk Encryption (Q5862675) (← links)