Search dblp for Publications

export results for "toc:db/conf/esorics/esorics2005.bht:"

 download as .bib file

@inproceedings{DBLP:conf/esorics/AdaoBHS05,
  author       = {Pedro Ad{\~{a}}o and
                  Gergei Bana and
                  Jonathan Herzog and
                  Andre Scedrov},
  editor       = {Sabrina De Capitani di Vimercati and
                  Paul F. Syverson and
                  Dieter Gollmann},
  title        = {Soundness of Formal Encryption in the Presence of Key-Cycles},
  booktitle    = {Computer Security - {ESORICS} 2005, 10th European Symposium on Research
                  in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3679},
  pages        = {374--396},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11555827\_22},
  doi          = {10.1007/11555827\_22},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/AdaoBHS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/AlbuquerqueKG05,
  author       = {Jo{\~{a}}o Porto de Albuquerque and
                  Heiko Krumm and
                  Paulo L{\'{\i}}cio de Geus},
  editor       = {Sabrina De Capitani di Vimercati and
                  Paul F. Syverson and
                  Dieter Gollmann},
  title        = {On Scalability and Modularisation in the Modelling of Network Security
                  Systems},
  booktitle    = {Computer Security - {ESORICS} 2005, 10th European Symposium on Research
                  in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3679},
  pages        = {287--304},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11555827\_17},
  doi          = {10.1007/11555827\_17},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/AlbuquerqueKG05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/AskarovS05,
  author       = {Aslan Askarov and
                  Andrei Sabelfeld},
  editor       = {Sabrina De Capitani di Vimercati and
                  Paul F. Syverson and
                  Dieter Gollmann},
  title        = {Security-Typed Languages for Implementation of Cryptographic Protocols:
                  {A} Case Study},
  booktitle    = {Computer Security - {ESORICS} 2005, 10th European Symposium on Research
                  in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3679},
  pages        = {197--221},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11555827\_12},
  doi          = {10.1007/11555827\_12},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/AskarovS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/AtenieseCMT05,
  author       = {Giuseppe Ateniese and
                  Daniel H. Chou and
                  Breno de Medeiros and
                  Gene Tsudik},
  editor       = {Sabrina De Capitani di Vimercati and
                  Paul F. Syverson and
                  Dieter Gollmann},
  title        = {Sanitizable Signatures},
  booktitle    = {Computer Security - {ESORICS} 2005, 10th European Symposium on Research
                  in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3679},
  pages        = {159--177},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11555827\_10},
  doi          = {10.1007/11555827\_10},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/AtenieseCMT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/AtluriG05,
  author       = {Vijayalakshmi Atluri and
                  Qi Guo},
  editor       = {Sabrina De Capitani di Vimercati and
                  Paul F. Syverson and
                  Dieter Gollmann},
  title        = {Unified Index for Mobile Object Data and Authorizations},
  booktitle    = {Computer Security - {ESORICS} 2005, 10th European Symposium on Research
                  in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3679},
  pages        = {80--97},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11555827\_6},
  doi          = {10.1007/11555827\_6},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/AtluriG05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/Backes05,
  author       = {Michael Backes},
  editor       = {Sabrina De Capitani di Vimercati and
                  Paul F. Syverson and
                  Dieter Gollmann},
  title        = {Quantifying Probabilistic Information Flow in Computational Reactive
                  Systems},
  booktitle    = {Computer Security - {ESORICS} 2005, 10th European Symposium on Research
                  in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3679},
  pages        = {336--354},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11555827\_20},
  doi          = {10.1007/11555827\_20},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/Backes05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/BackesP05,
  author       = {Michael Backes and
                  Birgit Pfitzmann},
  editor       = {Sabrina De Capitani di Vimercati and
                  Paul F. Syverson and
                  Dieter Gollmann},
  title        = {Limits of the Cryptographic Realization of Dolev-Yao-Style {XOR}},
  booktitle    = {Computer Security - {ESORICS} 2005, 10th European Symposium on Research
                  in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3679},
  pages        = {178--196},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11555827\_11},
  doi          = {10.1007/11555827\_11},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/BackesP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/ChaumRS05,
  author       = {David Chaum and
                  Peter Y. A. Ryan and
                  Steve A. Schneider},
  editor       = {Sabrina De Capitani di Vimercati and
                  Paul F. Syverson and
                  Dieter Gollmann},
  title        = {A Practical Voter-Verifiable Election Scheme},
  booktitle    = {Computer Security - {ESORICS} 2005, 10th European Symposium on Research
                  in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3679},
  pages        = {118--139},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11555827\_8},
  doi          = {10.1007/11555827\_8},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/ChaumRS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/CrescenzoGT05,
  author       = {Giovanni Di Crescenzo and
                  Abhrajit Ghosh and
                  Rajesh Talpade},
  editor       = {Sabrina De Capitani di Vimercati and
                  Paul F. Syverson and
                  Dieter Gollmann},
  title        = {Towards a Theory of Intrusion Detection},
  booktitle    = {Computer Security - {ESORICS} 2005, 10th European Symposium on Research
                  in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3679},
  pages        = {267--286},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11555827\_16},
  doi          = {10.1007/11555827\_16},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/CrescenzoGT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/DanezisLKA05,
  author       = {George Danezis and
                  Chris Lesniewski{-}Laas and
                  M. Frans Kaashoek and
                  Ross J. Anderson},
  editor       = {Sabrina De Capitani di Vimercati and
                  Paul F. Syverson and
                  Dieter Gollmann},
  title        = {Sybil-Resistant {DHT} Routing},
  booktitle    = {Computer Security - {ESORICS} 2005, 10th European Symposium on Research
                  in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3679},
  pages        = {305--318},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11555827\_18},
  doi          = {10.1007/11555827\_18},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/DanezisLKA05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/FreilingHW05,
  author       = {Felix C. Freiling and
                  Thorsten Holz and
                  Georg Wicherski},
  editor       = {Sabrina De Capitani di Vimercati and
                  Paul F. Syverson and
                  Dieter Gollmann},
  title        = {Botnet Tracking: Exploring a Root-Cause Methodology to Prevent Distributed
                  Denial-of-Service Attacks},
  booktitle    = {Computer Security - {ESORICS} 2005, 10th European Symposium on Research
                  in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3679},
  pages        = {319--335},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11555827\_19},
  doi          = {10.1007/11555827\_19},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/FreilingHW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/Gjosteen05,
  author       = {Kristian Gj{\o}steen},
  editor       = {Sabrina De Capitani di Vimercati and
                  Paul F. Syverson and
                  Dieter Gollmann},
  title        = {Security Notions for Disk Encryption},
  booktitle    = {Computer Security - {ESORICS} 2005, 10th European Symposium on Research
                  in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3679},
  pages        = {455--474},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11555827\_26},
  doi          = {10.1007/11555827\_26},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/Gjosteen05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/GogolewskiKK05,
  author       = {Marcin Gogolewski and
                  Marek Klonowski and
                  Miroslaw Kutylowski},
  editor       = {Sabrina De Capitani di Vimercati and
                  Paul F. Syverson and
                  Dieter Gollmann},
  title        = {Local View Attack on Anonymous Communication},
  booktitle    = {Computer Security - {ESORICS} 2005, 10th European Symposium on Research
                  in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3679},
  pages        = {475--488},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11555827\_27},
  doi          = {10.1007/11555827\_27},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/GogolewskiKK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/GrossPS05,
  author       = {Thomas Gro{\ss} and
                  Birgit Pfitzmann and
                  Ahmad{-}Reza Sadeghi},
  editor       = {Sabrina De Capitani di Vimercati and
                  Paul F. Syverson and
                  Dieter Gollmann},
  title        = {Browser Model for Security Analysis of Browser-Based Protocols},
  booktitle    = {Computer Security - {ESORICS} 2005, 10th European Symposium on Research
                  in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3679},
  pages        = {489--508},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11555827\_28},
  doi          = {10.1007/11555827\_28},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/GrossPS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/GuptaB05,
  author       = {Rajeev Gupta and
                  Manish Bhide},
  editor       = {Sabrina De Capitani di Vimercati and
                  Paul F. Syverson and
                  Dieter Gollmann},
  title        = {A Generic {XACML} Based Declarative Authorization Scheme for Java},
  booktitle    = {Computer Security - {ESORICS} 2005, 10th European Symposium on Research
                  in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3679},
  pages        = {44--63},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11555827\_4},
  doi          = {10.1007/11555827\_4},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/GuptaB05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/GurgensOR05,
  author       = {Sigrid G{\"{u}}rgens and
                  Peter Ochsenschl{\"{a}}ger and
                  Carsten Rudolph},
  editor       = {Sabrina De Capitani di Vimercati and
                  Paul F. Syverson and
                  Dieter Gollmann},
  title        = {Abstractions Preserving Parameter Confidentiality},
  booktitle    = {Computer Security - {ESORICS} 2005, 10th European Symposium on Research
                  in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3679},
  pages        = {418--437},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11555827\_24},
  doi          = {10.1007/11555827\_24},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/GurgensOR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/HiltyBP05,
  author       = {Manuel Hilty and
                  David A. Basin and
                  Alexander Pretschner},
  editor       = {Sabrina De Capitani di Vimercati and
                  Paul F. Syverson and
                  Dieter Gollmann},
  title        = {On Obligations},
  booktitle    = {Computer Security - {ESORICS} 2005, 10th European Symposium on Research
                  in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3679},
  pages        = {98--117},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11555827\_7},
  doi          = {10.1007/11555827\_7},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/HiltyBP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/JhaKM05,
  author       = {Somesh Jha and
                  Louis Kruger and
                  Patrick D. McDaniel},
  editor       = {Sabrina De Capitani di Vimercati and
                  Paul F. Syverson and
                  Dieter Gollmann},
  title        = {Privacy Preserving Clustering},
  booktitle    = {Computer Security - {ESORICS} 2005, 10th European Symposium on Research
                  in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3679},
  pages        = {397--417},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11555827\_23},
  doi          = {10.1007/11555827\_23},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/JhaKM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/LigattiBW05,
  author       = {Jay Ligatti and
                  Lujo Bauer and
                  David Walker},
  editor       = {Sabrina De Capitani di Vimercati and
                  Paul F. Syverson and
                  Dieter Gollmann},
  title        = {Enforcing Non-safety Security Policies with Program Monitors},
  booktitle    = {Computer Security - {ESORICS} 2005, 10th European Symposium on Research
                  in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3679},
  pages        = {355--373},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11555827\_21},
  doi          = {10.1007/11555827\_21},
  timestamp    = {Mon, 08 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/LigattiBW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/MassacciMZ05,
  author       = {Fabio Massacci and
                  John Mylopoulos and
                  Nicola Zannone},
  editor       = {Sabrina De Capitani di Vimercati and
                  Paul F. Syverson and
                  Dieter Gollmann},
  title        = {Minimal Disclosure in Hierarchical Hippocratic Databases with Delegation},
  booktitle    = {Computer Security - {ESORICS} 2005, 10th European Symposium on Research
                  in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3679},
  pages        = {438--454},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11555827\_25},
  doi          = {10.1007/11555827\_25},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/MassacciMZ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/QiK05,
  author       = {Naizhen Qi and
                  Michiharu Kudo},
  editor       = {Sabrina De Capitani di Vimercati and
                  Paul F. Syverson and
                  Dieter Gollmann},
  title        = {{XML} Access Control with Policy Matching Tree},
  booktitle    = {Computer Security - {ESORICS} 2005, 10th European Symposium on Research
                  in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3679},
  pages        = {3--23},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11555827\_2},
  doi          = {10.1007/11555827\_2},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/QiK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/RayP05,
  author       = {Indrajit Ray and
                  Nayot Poolsapassit},
  editor       = {Sabrina De Capitani di Vimercati and
                  Paul F. Syverson and
                  Dieter Gollmann},
  title        = {Using Attack Trees to Identify Malicious Attacks from Authorized Insiders},
  booktitle    = {Computer Security - {ESORICS} 2005, 10th European Symposium on Research
                  in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3679},
  pages        = {231--246},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11555827\_14},
  doi          = {10.1007/11555827\_14},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/RayP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/Simons05,
  author       = {Barbara Simons},
  editor       = {Sabrina De Capitani di Vimercati and
                  Paul F. Syverson and
                  Dieter Gollmann},
  title        = {Computerized Voting Machines: {A} View from the Trenches},
  booktitle    = {Computer Security - {ESORICS} 2005, 10th European Symposium on Research
                  in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3679},
  pages        = {1--2},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11555827\_1},
  doi          = {10.1007/11555827\_1},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/Simons05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/SohrAGM05,
  author       = {Karsten Sohr and
                  Gail{-}Joon Ahn and
                  Martin Gogolla and
                  Lars Migge},
  editor       = {Sabrina De Capitani di Vimercati and
                  Paul F. Syverson and
                  Dieter Gollmann},
  title        = {Specification and Validation of Authorisation Constraints Using {UML}
                  and {OCL}},
  booktitle    = {Computer Security - {ESORICS} 2005, 10th European Symposium on Research
                  in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3679},
  pages        = {64--79},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11555827\_5},
  doi          = {10.1007/11555827\_5},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/SohrAGM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/Tarento05,
  author       = {Sabrina Tarento},
  editor       = {Sabrina De Capitani di Vimercati and
                  Paul F. Syverson and
                  Dieter Gollmann},
  title        = {Machine-Checked Security Proofs of Cryptographic Signature Schemes},
  booktitle    = {Computer Security - {ESORICS} 2005, 10th European Symposium on Research
                  in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3679},
  pages        = {140--158},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11555827\_9},
  doi          = {10.1007/11555827\_9},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/Tarento05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/ValleGM05,
  author       = {Mariemma Inmaculada Yag{\"{u}}e del Valle and
                  Mar{\'{\i}}a{-}del{-}Mar Gallardo and
                  Antonio Mana},
  editor       = {Sabrina De Capitani di Vimercati and
                  Paul F. Syverson and
                  Dieter Gollmann},
  title        = {Semantic Access Control Model: {A} Formal Specification},
  booktitle    = {Computer Security - {ESORICS} 2005, 10th European Symposium on Research
                  in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3679},
  pages        = {24--43},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11555827\_3},
  doi          = {10.1007/11555827\_3},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/ValleGM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/WangLJ05,
  author       = {Lingyu Wang and
                  Anyi Liu and
                  Sushil Jajodia},
  editor       = {Sabrina De Capitani di Vimercati and
                  Paul F. Syverson and
                  Dieter Gollmann},
  title        = {An Efficient and Unified Approach to Correlating, Hypothesizing, and
                  Predicting Intrusion Alerts},
  booktitle    = {Computer Security - {ESORICS} 2005, 10th European Symposium on Research
                  in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3679},
  pages        = {247--266},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11555827\_15},
  doi          = {10.1007/11555827\_15},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/WangLJ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/ZhuB05,
  author       = {Huafei Zhu and
                  Feng Bao},
  editor       = {Sabrina De Capitani di Vimercati and
                  Paul F. Syverson and
                  Dieter Gollmann},
  title        = {Augmented Oblivious Polynomial Evaluation Protocol and Its Applications},
  booktitle    = {Computer Security - {ESORICS} 2005, 10th European Symposium on Research
                  in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3679},
  pages        = {222--230},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11555827\_13},
  doi          = {10.1007/11555827\_13},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/ZhuB05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2005,
  editor       = {Sabrina De Capitani di Vimercati and
                  Paul F. Syverson and
                  Dieter Gollmann},
  title        = {Computer Security - {ESORICS} 2005, 10th European Symposium on Research
                  in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3679},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11555827},
  doi          = {10.1007/11555827},
  isbn         = {3-540-28963-1},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/2005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics