Skip to main content
  • Conference proceedings
  • © 1994

Computer Security - ESORICS 94

Third European Symposium on Research in Computer Security, Brighton, United Kingdom, November 7 - 9, 1994. Proceedings

Editors:

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 875)

Conference series link(s): ESORICS: European Symposium on Research in Computer Security

Conference proceedings info: ESORICS 1994.

Buy it now

Buying options

Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (26 papers)

  1. Front Matter

  2. Valuation of trust in open networks

    • Thomas Beth, Malte Borcherding, Birgit Klein
    Pages 1-18
  3. Non-interference through determinism

    • A. W. Roscoe, J. C. P. Woodcock, L. Wulf
    Pages 31-53
  4. Compile-time detection of information flow in sequential programs

    • Jean-Pierre Banâtre, Ciarán Bryce, Daniel Le Métayer
    Pages 55-73
  5. Security through type analysis

    • C. O'Halloran, C. T. Sennett
    Pages 75-89
  6. Designing secure key exchange protocols

    • Colin Boyd, Wenbo Mao
    Pages 91-105
  7. Robust and secure password and key change method

    • Ralf Hauser, Philippe Janson, Refik Molva, Gene Tsudik, Els Van Herreweghen
    Pages 107-122
  8. Beacon based authentication

    • Azad Jiwa, Jennifer Seberry, Yuliang Zheng
    Pages 123-141
  9. Authentication via multi-service tickets in the Kuperee server

    • Thomas Hardjono, Jennifer Seberry
    Pages 143-160
  10. Oblivious signatures

    • Lidong Chen
    Pages 161-172
  11. A calculus for secure channel establishment in open networks

    • Ueli M. Maurer, Pierre E. Schmid
    Pages 173-192
  12. An efficient electronic payment system protecting privacy

    • Jan L. Camenisch, Jean-Marc Piveteau, Markus A. Stadler
    Pages 205-215
  13. The ESPRIT project CAFE —High security digital payment systems

    • Jean-Paul Boly, Antoon Bosselaers, Ronald Cramer, Rolf Michelsen, Stig Mjølsnes, Frank Muller et al.
    Pages 217-230
  14. Liability and computer security: Nine principles

    • Ross J. Anderson
    Pages 231-245
  15. A secure medium access control protocol: Security versus performances

    • Pierre Siron, Bruno d'Ausbourg
    Pages 267-279
  16. On the expressive power of the unary transformation model

    • Ravi S. Sandhu, Srinivas Ganta
    Pages 299-318

Other Volumes

  1. Computer Security — ESORICS 94

About this book

This volume constitutes the proceedings of the Third European Symposium on Research in Computer Security, held in Brighton, UK in November 1994.
The 26 papers presented in the book in revised versions were carefully selected from a total of 79 submissions; they cover many current aspects of computer security research and advanced applications. The papers are grouped in sections on high security assurance software, key management, authentication, digital payment, distributed systems, access control, databases, and measures.

Bibliographic Information

Buy it now

Buying options

Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access