Advertisement

Computer Security – ESORICS 2006

11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006. Proceedings

  • Dieter Gollmann
  • Jan Meier
  • Andrei Sabelfeld

Part of the Lecture Notes in Computer Science book series (LNCS, volume 4189)

Table of contents

  1. Front Matter
  2. Michael P. Collins, Michael K. Reiter
    Pages 1-17
  3. Vitaly Shmatikov, Ming-Hsiu Wang
    Pages 18-33
  4. Milan Fort, Felix Freiling, Lucia Draque Penso, Zinaida Benenson, Dogan Kesdogan
    Pages 34-48
  5. Shuhong Wang, Xuhua Ding, Robert H. Deng, Feng Bao
    Pages 49-64
  6. Yuji Watanabe, Sachiko Yoshihama, Takuya Mishina, Michiharu Kudo, Hiroshi Maruyama
    Pages 65-80
  7. Cheun Ngen Chong, Sorin Iacob, Paul Koster, Javier Montaner, René van Buuren
    Pages 81-96
  8. Abdellatif Benjelloun Touimi, Jean-Bernard Fischer, Caroline Fontaine, Christophe Giraud, Michel Milhau
    Pages 97-109
  9. Frédéric Besson, Guillaume Dufay, Thomas Jensen
    Pages 110-126
  10. Philip W. L. Fong
    Pages 127-144
  11. Xi-Bin Zhao, Kwok-Yan Lam, Guimin Luo, Siu-Leung Chung, Ming Gu
    Pages 145-155
  12. Hao Wang, Somesh Jha, Thomas Reps, Stefan Schwoon, Stuart Stubblebine
    Pages 156-173
  13. Jason Crampton, Hemanth Khambhammettu
    Pages 174-191
  14. Daniel Mellado, Eduardo Fernández-Medina, Mario Piattini
    Pages 192-206
  15. Jing Wang, Yoshiaki Takata, Hiroyuki Seki
    Pages 263-278
  16. Deepak Garg, Lujo Bauer, Kevin D. Bowers, Frank Pfenning, Michael K. Reiter
    Pages 297-312
  17. P Y A Ryan, S A Schneider
    Pages 313-326
  18. Michael Backes, Christian Cachin, Alina Oprea
    Pages 327-346
  19. M. Backes, I. Cervesato, A. D. Jaggard, A. Scedrov, J. -K. Tsay
    Pages 362-383
  20. Dusko Pavlovic, Catherine Meadows
    Pages 384-403
  21. Michael Backes, Birgit Pfitzmann, Michael Waidner
    Pages 404-423
  22. Michael Backes, Markus Dürmuth, Dennis Hofheinz, Ralf Küsters
    Pages 424-443
  23. Ted Huffmire, Shreyas Prasad, Tim Sherwood, Ryan Kastner
    Pages 461-478
  24. Zhiqiang Yang, Sheng Zhong, Rebecca N. Wright
    Pages 479-495
  25. J. G. Alfaro, F. Cuppens, N. Cuppens-Boulahia
    Pages 496-511
  26. Gabriel Maciá-Fernández, Jesús E. Díaz-Verdejo, Pedro García-Teodoro
    Pages 512-526
  27. Guofei Gu, Prahlad Fogla, David Dagon, Wenke Lee, Boris Skoric
    Pages 527-546
  28. Back Matter

About these proceedings

Keywords

DRM Hardware PKI access control algorithms calculus computer security database denial-of-service attacks digital signatures internet security intrusion detection logic modeling secure communications

Editors and affiliations

  • Dieter Gollmann
    • 1
  • Jan Meier
    • 2
  • Andrei Sabelfeld
    • 3
  1. 1.Institute for Security in Distributed ApplicationsHamburg University of TechnologyHamburgGermany
  2. 2.TU Hamburg-HarburgHamburg-HarburgGermany
  3. 3.Department of Computer Science and EngineeringChalmers University of TechnologyGöteborgSweden

Bibliographic information

  • DOI https://doi.org/10.1007/11863908
  • Copyright Information Springer-Verlag Berlin Heidelberg 2006
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-44601-9
  • Online ISBN 978-3-540-44605-7
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site