Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • 1
    UID:
    gbv_371287197
    Format: X, 343 S. , graph. Darst.
    ISBN: 3540203001
    Series Statement: Lecture notes in computer science 2808
    Additional Edition: Online-Ausg. Snekkenes, Einar, 1961 - Computer Security - ESORICS 2003 Berlin, Heidelberg : Springer Berlin Heidelberg, 2003 ISBN 9783540203001
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Computersicherheit ; Konferenzschrift ; Konferenzschrift
    URL: Cover
    Author information: Gollmann, Dieter
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    almahu_9947920539102882
    Format: X, 350 p. , online resource.
    ISBN: 9783540396505
    Series Statement: Lecture Notes in Computer Science, 2808
    Content: ESORICS, the European Symposium On Research In Computer Security, is the leading research-oriented conference on the theory and practice of computer - curity in Europe. The aim of ESORICS is to further the progress of research in computer security by establishing a European forum for bringing together - searchersinthisarea,bypromotingtheexchangeofideaswithsystemdevelopers and by encouraging links with researchers in related areas. ESORICS is coordinated by an independent steering committee. In the past it took place every two years at various locations throughout Europe. Starting this year, it will take place annually. ESORICS 2003 was organized by Gjøvik University College, and took place in Gjøvik, Norway, October 13–15, 2003. The program committee received 114 submissions, originating from 26 co- tries on all continents. Half the papers originated in Europe (57). The most dominant countries were: UK (16), USA (14), Germany (6), South Korea (6), Sweden (6), Italy (5), France (4) and Poland (4). Each submission was reviewed by at least three program committee members or other experts. The program committee chair and co-chair were not allowed to submit papers. The ?nal sel- tion of papers was made at a program committee meeting followed by a week of e-mail discussions. Out of the 114 papers received, only 19 got accepted (17%). In comparison, ESORICS 2000and 2002received 75and 83papersand accepted 19% and 16%, respectively. The program re?ected the full range of security research, including access control, cryptographic protocols, privacy enhancing technologies, security m- els, authentication, and intrusion detection.
    Note: Signature and Access Control Policies for XML Documents -- Authorization and Access Control in Adaptive Workflows -- Flexible Regulation of Distributed Coalitions -- Initiator-Resilient Universally Composable Key Exchange -- Multi-round Secure Light-Weight Broadcast Exclusion Protocol with Pre-processing -- Precisely Answering Multi-dimensional Range Queries without Privacy Breaches -- Passive Attack Analysis for Connection-Based Anonymity Systems -- Rapid Mixing and Security of Chaum’s Visual Electronic Voting -- Towards Accountable Management of Privacy and Identity Information -- A Toolkit for Managing Enterprise Privacy Policies -- Authenticating Mandatory Access Controls and Preserving Privacy for a High-Assurance Smart Card -- Hardware Encapsulation of Security Services -- A Formal Security Model of the Infineon SLE 88 Smart Card Memory Management -- Bridging Model-Based and Language-Based Security -- An On-the-Fly Model-Checker for Security Protocol Analysis -- Symmetric Authentication within a Simulatable Cryptographic Library -- An Improved Reference Flow Control Model for Policy-Based Intrusion Detection -- Visualisation for Intrusion Detection -- On the Detection of Anomalous System Call Arguments.
    In: Springer eBooks
    Additional Edition: Printed edition: ISBN 9783540203001
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    UID:
    gbv_749172312
    Format: Online-Ressource (X, 345 p. Also available online) , digital
    Edition: Springer eBook Collection. Computer Science
    ISBN: 9783540396505
    Series Statement: Lecture Notes in Computer Science 2808
    Content: This book constitutes the refereed proceedings of the 8th European Symposium on Research in Computer Security, ESORICS 2003, held in Gjovik, Norway in October 2003. The 19 revised full papers presented were carefully reviewed and selected from 114 submissions. Among the topics addressed are signature control, access control, key exchange, broadcast protocols, privacy preserving technologies, attack analysis, electronic voting, identity control, authentication, security services, smart card security, formal security protocols analysis, and intrusion detection
    Additional Edition: ISBN 9783540203001
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 9783662196298
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 9783540203001
    Language: English
    URL: Volltext  (lizenzpflichtig)
    Author information: Gollmann, Dieter
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    UID:
    almahu_9948621324302882
    Format: X, 350 p. , online resource.
    Edition: 1st ed. 2003.
    ISBN: 9783540396505
    Series Statement: Lecture Notes in Computer Science, 2808
    Content: ESORICS, the European Symposium On Research In Computer Security, is the leading research-oriented conference on the theory and practice of computer - curity in Europe. The aim of ESORICS is to further the progress of research in computer security by establishing a European forum for bringing together - searchersinthisarea,bypromotingtheexchangeofideaswithsystemdevelopers and by encouraging links with researchers in related areas. ESORICS is coordinated by an independent steering committee. In the past it took place every two years at various locations throughout Europe. Starting this year, it will take place annually. ESORICS 2003 was organized by Gjøvik University College, and took place in Gjøvik, Norway, October 13-15, 2003. The program committee received 114 submissions, originating from 26 co- tries on all continents. Half the papers originated in Europe (57). The most dominant countries were: UK (16), USA (14), Germany (6), South Korea (6), Sweden (6), Italy (5), France (4) and Poland (4). Each submission was reviewed by at least three program committee members or other experts. The program committee chair and co-chair were not allowed to submit papers. The ?nal sel- tion of papers was made at a program committee meeting followed by a week of e-mail discussions. Out of the 114 papers received, only 19 got accepted (17%). In comparison, ESORICS 2000and 2002received 75and 83papersand accepted 19% and 16%, respectively. The program re?ected the full range of security research, including access control, cryptographic protocols, privacy enhancing technologies, security m- els, authentication, and intrusion detection.
    Note: Signature and Access Control Policies for XML Documents -- Authorization and Access Control in Adaptive Workflows -- Flexible Regulation of Distributed Coalitions -- Initiator-Resilient Universally Composable Key Exchange -- Multi-round Secure Light-Weight Broadcast Exclusion Protocol with Pre-processing -- Precisely Answering Multi-dimensional Range Queries without Privacy Breaches -- Passive Attack Analysis for Connection-Based Anonymity Systems -- Rapid Mixing and Security of Chaum's Visual Electronic Voting -- Towards Accountable Management of Privacy and Identity Information -- A Toolkit for Managing Enterprise Privacy Policies -- Authenticating Mandatory Access Controls and Preserving Privacy for a High-Assurance Smart Card -- Hardware Encapsulation of Security Services -- A Formal Security Model of the Infineon SLE 88 Smart Card Memory Management -- Bridging Model-Based and Language-Based Security -- An On-the-Fly Model-Checker for Security Protocol Analysis -- Symmetric Authentication within a Simulatable Cryptographic Library -- An Improved Reference Flow Control Model for Policy-Based Intrusion Detection -- Visualisation for Intrusion Detection -- On the Detection of Anomalous System Call Arguments.
    In: Springer Nature eBook
    Additional Edition: Printed edition: ISBN 9783662196298
    Additional Edition: Printed edition: ISBN 9783540203001
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Did you mean 3540120300?
Did you mean 3540003010?
Did you mean 3540003061?
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages