Publications
Search

Publications :: Search

Show venue

On this page you see the details of the selected venue.

    Conference
    Name: Computer Security - ESORICS 2008, 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings 2008
    URL: https://doi.org/10.1007/978-3-540-88313-5
    DBLP: db/conf/esorics/esorics2008.html
    Bookmark:

    Below you find the publications assigned to this venue.

    Show item 1 to 10 of 37  
    Select a publication
    Show Title Venue Rating Date
    Conference paper
    Yingjiu Li, Haibing Lu.
    Disclosure Analysis and Control in Statistical Databases.
    Computer Security - ESORICS 2008, 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings 2008 (0) 2008
    Conference paper
    C. P. Mu, X. J. Li, H. K. Huang, S. F. Tian.
    Online Risk Assessment of Intrusion Scenarios Using D-S Evidence Theory.
    Computer Security - ESORICS 2008, 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings 2008 (0) 2008
    Conference paper
    Sergio Maffeis, Martín Abadi, Cédric Fournet, Andrew D. Gordon.
    Code-Carrying Authorization.
    Computer Security - ESORICS 2008, 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings 2008 (0) 2008
    Conference paper
    Santiago Escobar, Catherine A. Meadows, José Meseguer.
    State Space Reduction in the Maude-NRL Protocol Analyzer.
    Computer Security - ESORICS 2008, 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings 2008 (0) 2008
    Conference paper
    Reginald E. Sawilla, Xinming Ou.
    Identifying Critical Attack Assets in Dependency Attack Graphs.
    Computer Security - ESORICS 2008, 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings 2008 (0) 2008
    Conference paper
    Bezawada Bruhadeshwar, Sandeep S. Kulkarni, Alex X. Liu.
    Symmetric Key Approaches to Securing BGP - A Little Bit Trust Is Enough.
    Computer Security - ESORICS 2008, 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings 2008 (0) 2008
    Conference paper
    Flavio D. Garcia, Gerhard de Koning Gans, Ruben Muijrers, Peter van Rossum, Roel Verdult, Ronny Wichers Schreur, Bart Jacobs.
    Dismantling MIFARE Classic.
    Computer Security - ESORICS 2008, 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings 2008 (0) 2008
    Conference paper
    Aslan Askarov, Sebastian Hunt, Andrei Sabelfeld, David Sands.
    Termination-Insensitive Noninterference Leaks More Than Just a Bit.
    Computer Security - ESORICS 2008, 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings 2008 (0) 2008
    Conference paper
    Gelareh Taban, Virgil D. Gligor.
    Efficient Handling of Adversary Attacks in Aggregation Applications.
    Computer Security - ESORICS 2008, 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings 2008 (0) 2008
    Conference paper
    Dan Bogdanov, Sven Laur, Jan Willemson.
    Sharemind: A Framework for Fast Privacy-Preserving Computations.
    Computer Security - ESORICS 2008, 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings 2008 (0) 2008
    Show item 1 to 10 of 37  

    Your query returned 37 matches in the database.