Fixed vs. Variable-Length Patterns for Detecting Suspicious Process Behavior / H. Debar ; M. Dacier ; M. Nassehi ; A. Wespi |
A Tool for Pro-active Defense Against the Buffer Overrun Attack / D. Bruschi ; E. Rosti ; R. Banfi |
A Kernelized Architecture for Multilevel Secure Application Policies / S.N. Foley |
Dealing with Multi-policy Security in Large Open Distributed Systems / C. Bidan ; V. Issarny |
A Flexible Method for Information System Security Policy Specification / R. Ortalo |
On the Security of Some Variants of the RSA Signature Scheme / M. Michels ; M. Stadler ; H.-M. Sun |
Side Channel Cryptanalysis of Product Ciphers / J. Kelsey ; B. Schneier ; D. Wagner ; C. Hall |
On the Security of Digital Tachographs / R. Anderson |
An Authorization Model and Its Formal Semantics / E. Bertino ; F. Buccafurri ; E. Ferrari ; P. Rullo |
Authorization in CORBA Security / G. Karjoth |
Rules for Designing Multilevel Object-Oriented Databases / F. Cuppens ; A. Gabillon |
Byte Code Verification for Java Smart Cards Based on Model Checking / J. Posegga ; H. Vogt |
Towards Formalizing the Java Security Architecture of JDK 1.2 / L. L. Kassab ; S. J. Greenwald |
EUROMED-JAVA: Trusted Third Party Services for Securing Medical Java Applets / A. Varvitsiotis ; D. Polemi ; A. Marsh |
MPEG PTY-Marks: Cheap Detection of Embedded Copyright Data in |
DVD-Video / J.P.M.G. Linnartz ; J.C. Talstra |
DHWM: A Scheme for Managing Watermarking Keys in the Aquarelle |
Multimedia Distributed System / D. Augot ; J.-F. Delaigle ; C. Fontaine |
The "Ticket" Concept for Copy Control Based on Embedded Signalling |
Panel Session: Watermarking / G. Eizenberg ; J.-J. Quisquater |
Authentication and Payment in Future Mobile Systems / G. Horn ; B. Preneel |
Distributed Temporary Pseudonyms: A New Approach for Protecting Location Information in Mobile Communication Networks / D. Kesdogan ; P. Reichl ; K. Junghartchen |
A Mix-Mediated Anonymity Service and Its Payment / E. Franz ; A. Jerichow |
A Subjective Metric of Authentication / A. Jøsang |
A Sound Logic for Analysing Electronic Commerce Protocols / V. Kessler ; H. Neumann |
Kerberos Version IV: Inductive Analysis of the Secrecy Goals / G. Bella ; L.C. Paulson |
Author Index |
Fixed vs. Variable-Length Patterns for Detecting Suspicious Process Behavior / H. Debar ; M. Dacier ; M. Nassehi ; A. Wespi |
A Tool for Pro-active Defense Against the Buffer Overrun Attack / D. Bruschi ; E. Rosti ; R. Banfi |
A Kernelized Architecture for Multilevel Secure Application Policies / S.N. Foley |