↓ Skip to main content

Computer Security – ESORICS 2006

Overview of attention for book
Cover of 'Computer Security – ESORICS 2006'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Finding Peer-to-Peer File-Sharing Using Coarse Network Behaviors
  3. Altmetric Badge
    Chapter 2 Timing Analysis in Low-Latency Mix Networks: Attacks and Defenses
  4. Altmetric Badge
    Chapter 3 TrustedPals: Secure Multiparty Computation Implemented with Smart Cards
  5. Altmetric Badge
    Chapter 4 Private Information Retrieval Using Trusted Hardware
  6. Altmetric Badge
    Chapter 5 Bridging the Gap Between Inter-communication Boundary and Internal Trusted Components
  7. Altmetric Badge
    Chapter 6 License Transfer in OMA-DRM
  8. Altmetric Badge
    Chapter 7 Enhanced Security Architecture for Music Distribution on Mobile
  9. Altmetric Badge
    Chapter 8 A Formal Model of Access Control for Mobile Interactive Devices
  10. Altmetric Badge
    Chapter 9 Discretionary Capability Confinement
  11. Altmetric Badge
    Chapter 10 Minimal Threshold Closure
  12. Altmetric Badge
    Chapter 11 Reducing the Dependence of SPKI/SDSI on PKI
  13. Altmetric Badge
    Chapter 12 Delegation in Role-Based Access Control
  14. Altmetric Badge
    Chapter 13 Applying a Security Requirements Engineering Process
  15. Altmetric Badge
    Chapter 14 Modeling and Evaluating the Survivability of an Intrusion Tolerant Database System
  16. Altmetric Badge
    Chapter 15 A Formal Framework for Confidentiality-Preserving Refinement
  17. Altmetric Badge
    Chapter 16 Timing-Sensitive Information Flow Analysis for Synchronous Systems
  18. Altmetric Badge
    Chapter 17 HBAC: A Model for History-Based Access Control and Its Model Checking
  19. Altmetric Badge
    Chapter 18 From Coupling Relations to Mated Invariants for Checking Information Flow
  20. Altmetric Badge
    Chapter 19 A Linear Logic of Authorization and Knowledge
  21. Altmetric Badge
    Chapter 20 Computer Security – ESORICS 2006
  22. Altmetric Badge
    Chapter 21 Secure Key-Updating for Lazy Revocation
  23. Altmetric Badge
    Chapter 22 Key Derivation Algorithms for Monotone Access Structures in Cryptographic File Systems
  24. Altmetric Badge
    Chapter 23 Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos
  25. Altmetric Badge
    Chapter 24 Deriving Secrecy in Key Establishment Protocols
  26. Altmetric Badge
    Chapter 25 Limits of the BRSIM/UC Soundness of Dolev-Yao Models with Hashes
  27. Altmetric Badge
    Chapter 26 Conditional Reactive Simulatability
  28. Altmetric Badge
    Chapter 27 SessionSafe: Implementing XSS Immune Session Handling
  29. Altmetric Badge
    Chapter 28 Policy-Driven Memory Protection for Reconfigurable Hardware
  30. Altmetric Badge
    Chapter 29 Privacy-Preserving Queries on Encrypted Data
  31. Altmetric Badge
    Chapter 30 Analysis of Policy Anomalies on Distributed Network Security Setups
  32. Altmetric Badge
    Chapter 31 Assessment of a Vulnerability in Iterative Servers Enabling Low-Rate DoS Attacks
  33. Altmetric Badge
    Chapter 32 Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems
Overall attention for this book and its chapters
Altmetric Badge

Mentioned by

patent
1 patent
wikipedia
6 Wikipedia pages

Citations

dimensions_citation
2 Dimensions

Readers on

mendeley
11 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Title
Computer Security – ESORICS 2006
Published by
Springer Science & Business Media, September 2006
DOI 10.1007/11863908
ISBNs
978-3-54-044601-9, 978-3-54-044605-7
Editors

Gollmann, Dieter, Meier, Jan, Sabelfeld, Andrei

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 11 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 11 100%

Demographic breakdown

Readers by professional status Count As %
Student > Postgraduate 1 9%
Unknown 10 91%
Readers by discipline Count As %
Computer Science 1 9%
Unknown 10 91%