Advertisement

Computer Security - ESORICS 2000

6th European Symposium on Research in Computer Security, Toulouse, France, October 4-6, 2000. Proceedings

  • Frédéric Cuppens
  • Yves Deswarte
  • Dieter Gollmann
  • Michael Waidner
Conference proceedings ESORICS 2000

Part of the Lecture Notes in Computer Science book series (LNCS, volume 1895)

Table of contents

  1. Front Matter
  2. Personal Devices and Smart Cards

    1. P. Bieber, J. Cazin, P. Girard, J. -L. Lanet, V. Wiels, G. Zanon
      Pages 1-16
    2. Gerhard Schellhorn, Wolfgang Reif, Axel Schairer, Paul Karger, Vernon Austel, David Toll
      Pages 17-36
  3. Electronic Commerce Protocols

    1. Els Van Herreweghen
      Pages 55-71
    2. Barbara Masucci, Douglas R. Stinson
      Pages 72-87
  4. Access Control

    1. Gerald Brose
      Pages 88-105
    2. Manuel Koch, Luigi V. Mancini, Francesco Parisi-Presicce
      Pages 122-139
  5. Protocol Verification

    1. Jon Howell, David Kotz
      Pages 140-158
    2. Giampaolo Bella, Fabio Massacci, Lawrence C. Paulson, Piero Tramontano
      Pages 159-174
    3. P. J. Broadfoot, G. Lowe, A. W. Roscoe
      Pages 175-190
  6. Internet Security

    1. Kunikazu Yoda, Hiroaki Etoh
      Pages 191-205
    2. Olivier Paul, Maryline Laurent, Sylvain Gombault
      Pages 206-221
  7. Security Property Analysis

    1. Neil Evans, Steve Schneider
      Pages 222-237
    2. Heiko Mantel
      Pages 238-254
    3. Joshua D. Guttman, Amy L. Herzog, F. Javier Thayer
      Pages 255-272
  8. Mobile Agents

    1. Refik Molva, Yves Roudier
      Pages 291-308
  9. Back Matter

About these proceedings

Introduction

his book presents the refereed proceedings of the 6th European Symposium on Research in Computer Security, ESORICS 2000, held in Toulouse, France in October 2000.
The 19 revised full papers presented were carefully reviewed and selected from a total of 75 submissions. The papers are organized in sections on personal devices and smart cards, electronic commerce protocols, access control, protocol verification, Internet security, security property analysis, and mobile agents.

Keywords

ATM CORBA Computer Security Digital Payment Electronic Commerce Formal Protocol Verification Internet Protocol (IP) Java Mobile Code Network Security Secure Networks Smart Cards formal verification security verification

Editors and affiliations

  • Frédéric Cuppens
    • 1
  • Yves Deswarte
    • 2
  • Dieter Gollmann
    • 3
  • Michael Waidner
    • 4
  1. 1.TELECOM BretagneCesson Sévigné CedexFrance
  2. 2.LAAS-CNRS 
  3. 3.Institute for Security in Distributed ApplicationsHamburg University of TechnologyHamburgGermany
  4. 4.Zurich Research LaboratoryIBM ResearchRüschlikonSwitzerland

Bibliographic information

  • DOI https://doi.org/10.1007/10722599
  • Copyright Information Springer-Verlag Berlin Heidelberg 2000
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-41031-7
  • Online ISBN 978-3-540-45299-7
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Pharma
Automotive
Biotechnology
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Energy, Utilities & Environment
Aerospace
Oil, Gas & Geosciences
Engineering