Computer Security — ESORICS 2002

7th European Symposium on Research in Computer Security Zurich, Switzerland, October 14–16, 2002 Proceedings

  • Dieter Gollmann
  • Günther Karjoth
  • Michael Waidner
Conference proceedings ESORICS 2002

Part of the Lecture Notes in Computer Science book series (LNCS, volume 2502)

Table of contents

  1. Front Matter
    Pages I-X
  2. Michael Backes, Birgit Pfitzmann
    Pages 1-23
  3. Kaoru Kurosawa, Wakaha Ogata
    Pages 24-38
  4. Lingyu Wang, Duminda Wijesekera, Sushil Jajodia
    Pages 55-71
  5. Marcin Gomuffłkiewicz, Mirosffław Kutyffłowski
    Pages 90-103
  6. James Giles, Reiner Sailer, Dinesh Verma, Suresh Chari
    Pages 126-146
  7. Philippa Broadfoot, Gavin Lowe
    Pages 146-162
  8. James Heather, Steve Schneider
    Pages 162-177
  9. Aloysius K. Mok, Weijiang Yu
    Pages 178-193
  10. Thomas Santen, Maritta Heisel, Andreas Pfitzmann
    Pages 194-211
  11. David von Oheimb, Volkmar Lotz
    Pages 212-229
  12. Manuel Koch, Luigi V. Mancini, Francesco Parisi-Presicce
    Pages 229-244
  13. Sin Yeung Lee, Wai Lup Low, Pei Yuen Wong
    Pages 264-279
  14. Back Matter
    Pages 281-281

About these proceedings


ESORICS, the European Symposium on Research in Computer Security, is the leading research-oriented conference on the theory and practice of computer security in Europe. It takes place every two years, at various locations throughout Europe, and is coordinated by an independent Steering Committee. ESORICS 2002 was jointly organized by the Swiss Federal Institute of Te- nology (ETH) and the IBM Zurich Research Laboratory, and took place in Zurich, Switzerland, October 14-16, 2002. The program committee received 83 submissions, originating from 22 co- tries. For fans of statistics: 55 submissions came from countries in Europe, the Middle East, or Africa, 16 came from Asia, and 12from North America. The leading countries were USA (11 submissions), Germany (9), France (7), Italy (7), Japan (6), and UK (6). Each submission was reviewed by at least three p- gram committee members or other experts. Each submission coauthored by a program committee member received two additional reviews. The program c- mittee chair and cochair were not allowed to submit papers. The ?nal selection of papers was made at a program committee meeting and resulted in 16 accepted papers. In comparison, ESORICS 2000 received 75 submissions and accepted 19 of them. The program re?ects the full range of security research: we accepted papers on access control, authentication, cryptography, database security, formal methods, intrusion detection, mobile code security, privacy, secure hardware, and secure protocols. We gratefully acknowledge all authors who submitted papers for their e?orts in maintaining the standards of this conference.


Access Control Authentication Code Computer Security Digital Payment Electronic Commerce Formal Security Analysis Internet Security Mobile Code Network Security Privacy Secure Networks Web Service Security security

Editors and affiliations

  • Dieter Gollmann
    • 1
  • Günther Karjoth
    • 2
  • Michael Waidner
    • 2
  1. 1.Microsoft ResearchCambridgeUK
  2. 2.IBM Zurich Research LabRüschlikonSwitzerland

Bibliographic information

  • DOI
  • Copyright Information Springer-Verlag Berlin Heidelberg 2002
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-44345-2
  • Online ISBN 978-3-540-45853-1
  • Series Print ISSN 0302-9743
  • Buy this book on publisher's site
Industry Sectors
Finance, Business & Banking
IT & Software