Advertisement

Computer Security – ESORICS 2006

11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006. Proceedings

  • Dieter Gollmann
  • Jan Meier
  • Andrei Sabelfeld
Conference proceedings ESORICS 2006

Part of the Lecture Notes in Computer Science book series (LNCS, volume 4189)

Table of contents

  1. Front Matter
  2. Michael P. Collins, Michael K. Reiter
    Pages 1-17
  3. Vitaly Shmatikov, Ming-Hsiu Wang
    Pages 18-33
  4. Milan Fort, Felix Freiling, Lucia Draque Penso, Zinaida Benenson, Dogan Kesdogan
    Pages 34-48
  5. Shuhong Wang, Xuhua Ding, Robert H. Deng, Feng Bao
    Pages 49-64
  6. Yuji Watanabe, Sachiko Yoshihama, Takuya Mishina, Michiharu Kudo, Hiroshi Maruyama
    Pages 65-80
  7. Cheun Ngen Chong, Sorin Iacob, Paul Koster, Javier Montaner, René van Buuren
    Pages 81-96
  8. Abdellatif Benjelloun Touimi, Jean-Bernard Fischer, Caroline Fontaine, Christophe Giraud, Michel Milhau
    Pages 97-109
  9. Frédéric Besson, Guillaume Dufay, Thomas Jensen
    Pages 110-126
  10. Philip W. L. Fong
    Pages 127-144
  11. Xi-Bin Zhao, Kwok-Yan Lam, Guimin Luo, Siu-Leung Chung, Ming Gu
    Pages 145-155
  12. Hao Wang, Somesh Jha, Thomas Reps, Stefan Schwoon, Stuart Stubblebine
    Pages 156-173
  13. Jason Crampton, Hemanth Khambhammettu
    Pages 174-191
  14. Daniel Mellado, Eduardo Fernández-Medina, Mario Piattini
    Pages 192-206
  15. Jing Wang, Yoshiaki Takata, Hiroyuki Seki
    Pages 263-278
  16. Deepak Garg, Lujo Bauer, Kevin D. Bowers, Frank Pfenning, Michael K. Reiter
    Pages 297-312
  17. P Y A Ryan, S A Schneider
    Pages 313-326
  18. Michael Backes, Christian Cachin, Alina Oprea
    Pages 327-346
  19. M. Backes, I. Cervesato, A. D. Jaggard, A. Scedrov, J. -K. Tsay
    Pages 362-383
  20. Dusko Pavlovic, Catherine Meadows
    Pages 384-403
  21. Michael Backes, Birgit Pfitzmann, Michael Waidner
    Pages 404-423
  22. Michael Backes, Markus Dürmuth, Dennis Hofheinz, Ralf Küsters
    Pages 424-443
  23. Ted Huffmire, Shreyas Prasad, Tim Sherwood, Ryan Kastner
    Pages 461-478
  24. Zhiqiang Yang, Sheng Zhong, Rebecca N. Wright
    Pages 479-495
  25. J. G. Alfaro, F. Cuppens, N. Cuppens-Boulahia
    Pages 496-511
  26. Gabriel Maciá-Fernández, Jesús E. Díaz-Verdejo, Pedro García-Teodoro
    Pages 512-526
  27. Guofei Gu, Prahlad Fogla, David Dagon, Wenke Lee, Boris Skoric
    Pages 527-546
  28. Back Matter

About these proceedings

Keywords

DRM Hardware PKI access control algorithms calculus computer security database denial-of-service attacks digital signatures internet security intrusion detection logic modeling secure communications

Editors and affiliations

  • Dieter Gollmann
    • 1
  • Jan Meier
    • 2
  • Andrei Sabelfeld
    • 3
  1. 1.Institute for Security in Distributed ApplicationsHamburg University of TechnologyHamburgGermany
  2. 2.TU Hamburg-HarburgHamburg-HarburgGermany
  3. 3.Department of Computer Science and EngineeringChalmers University of TechnologyGöteborgSweden

Bibliographic information

  • DOI https://doi.org/10.1007/11863908
  • Copyright Information Springer-Verlag Berlin Heidelberg 2006
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-44601-9
  • Online ISBN 978-3-540-44605-7
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Automotive
Electronics
IT & Software
Telecommunications
Aerospace
Engineering