Atjaunināt sīkdatņu piekrišanu

Computer Security -- ESORICS 2002: 7th European Symposium on Research in Computer Security Zurich, Switzerland, October 14-16, 2002, Proceedings 2002 ed. [Mīkstie vāki]

Edited by , Edited by , Edited by
  • Formāts: Paperback / softback, 298 pages, height x width: 235x155 mm, weight: 960 g, CCCVIII, 298 p., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 2502
  • Izdošanas datums: 30-Sep-2002
  • Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • ISBN-10: 3540443452
  • ISBN-13: 9783540443452
Citas grāmatas par šo tēmu:
  • Mīkstie vāki
  • Cena: 46,91 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 55,19 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 298 pages, height x width: 235x155 mm, weight: 960 g, CCCVIII, 298 p., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 2502
  • Izdošanas datums: 30-Sep-2002
  • Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • ISBN-10: 3540443452
  • ISBN-13: 9783540443452
Citas grāmatas par šo tēmu:
ESORICS, the European Symposium on Research in Computer Security, is the leading research-oriented conference on the theory and practice of computer security in Europe. It takes place every two years, at various locations throughout Europe, and is coordinated by an independent Steering Committee. ESORICS 2002 was jointly organized by the Swiss Federal Institute of Te- nology (ETH) and the IBM Zurich Research Laboratory, and took place in Zurich, Switzerland, October 14-16, 2002. The program committee received 83 submissions, originating from 22 co- tries. For fans of statistics: 55 submissions came from countries in Europe, the Middle East, or Africa, 16 came from Asia, and 12from North America. The leading countries were USA (11 submissions), Germany (9), France (7), Italy (7), Japan (6), and UK (6). Each submission was reviewed by at least three p- gram committee members or other experts. Each submission coauthored by a program committee member received two additional reviews. The program c- mittee chair and cochair were not allowed to submit papers. The ?nal selection of papers was made at a program committee meeting and resulted in 16 accepted papers. In comparison, ESORICS 2000 received 75 submissions and accepted 19 of them. The program re ects the full range of security research: we accepted papers on access control, authentication, cryptography, database security, formal methods, intrusion detection, mobile code security, privacy, secure hardware, and secure protocols. We gratefully acknowledge all authors who submitted papers for their e orts in maintaining the standards of this conference.

Papildus informācija

Springer Book Archives
Computational Probabilistic Non-interference
1(23)
Michael Backes
Birgit Pfitzmann
Bit-Slice Auction Circuit
24(15)
Kaoru Kurosawa
Wakaha Ogata
Confidentiality Policies and Their Enforcement for Controlled Query Evaluation
39(16)
Joachim Biskup
Piero Bonatti
Cardinality-Based Inference Control in Sum-Only Data Cubes
55(17)
Lingyu Wang
Duminda Wijesekera
Sushil Jajodia
Outbound Authentication for Programmable Secure Coprocessors
72(18)
Sean W. Smith
Hamming Weight Attacks on Cryptographic Hardware - Breaking Masking Defense
90(14)
Marcin Gomutkiewicz
Mirostaw Kutytowski
A Fully Compliant Research Implementation of the P3P Standard for Privacy Protection: Experiences and Recommendations
104(22)
Giles Hogben
Tom Jackson
Marc Wilikens
Authentication for Distributed Web Caches
126(20)
James Giles
Reiner Sailer
Dinesh Verma
Suresh Chari
Analysing a Stream Authentication Protocol Using Model Checking
146(16)
Philippa Broadfoot
Gavin Lowe
Equal To The Task?
162(16)
James Heather
Steve Schneider
TINMAN: A Resource Bound Security Checking System for Mobile Code
178(16)
Aloysius K. Mok
Weijiang Yu
Confidentiality-Preserving Refinement is Compositional - Sometimes
194(18)
Thomas Santen
Maritta Heisel
Andreas Pfitzmann
Formal Security Analysis with Interacting State Machines
212(17)
David von Oheimb
Volkmar Lotz
Decidability of Safety in Graph-Based Models for Access Control
229(15)
Manuel Koch
Luigi V. Mancini
Francesco Parisi-Presicce
Inter-Packet Delay Based Correlation for Tracing Encrypted Connections through Stepping Stones
244(20)
Xinyuan Wang
Douglas S. Reeves
S. Felix Wu
Learning Fingerprints for a Database Intrusion Detection System
264(17)
Sin Yeung Lee
Wai Lup Low
Pei Yuen Wong
Author Index 281