close
1.

図書

図書
Elisa Bertino ... [et al.], (eds.)
出版情報: Berlin : Springer, c1996  x, 364 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 1146
所蔵情報: loading…
2.

図書

図書
Dieter Gollmann (ed.)
出版情報: Berlin : Springer, c1994  xi, 468 p. ; 25 cm
シリーズ名: Lecture notes in computer science ; 875
所蔵情報: loading…
3.

図書

図書
Pierangela Samarati ... [et al.] (eds.)
出版情報: Berlin : Springer, c2004  x, 456 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 3193
所蔵情報: loading…
4.

図書

図書
Y. Deswarte, G. Eizenberg, J.-J. Quisquater (eds.)
出版情報: Berlin : Springer, c1992  xi, 450 p. ; 25 cm
シリーズ名: Lecture notes in computer science ; 648
所蔵情報: loading…
5.

図書

図書
Dieter Gollmann, Günter Karjoth, Michael Waidner (eds.)
出版情報: Berlin : Springer, c2002  x, 279 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2502
所蔵情報: loading…
6.

図書

図書
Frédéric Cuppens ... [et al.]
出版情報: Berlin : Springer, c2000  x, 323 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 1895
所蔵情報: loading…
7.

図書

図書
Dieter Gollmann, Jan Meier, Andrei Sabelfeld (eds.)
出版情報: Berlin : Springer, c2006  xi, 548 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 4189
所蔵情報: loading…
8.

図書

図書
Sabrina De Capitani di Vimercati, Paul Syverson, Dieter Gollmann (eds.)
出版情報: Berlin : Springer, c2005  xi, 508 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 3679
所蔵情報: loading…
9.

図書

図書
Einar Snekkenes, Dieter Gollmann (eds.)
出版情報: Berlin ; Tokyo : Springer, c2003  x, 343 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2808
所蔵情報: loading…
目次情報: 続きを見る
Signature and Access Control Policies for XML Documents / Elisa Bertino ; Elena Ferrari ; Loredana Parasiliti Provenza
Authorization and Access Control in Adaptive Workflows / Dulce Domingos ; António Rito-Silva ; Pedro Veiga
Flexible Regulation of Distributed Coalitions / Xuhui Ao ; Naftaly H. Minsky
Initiator-Resilient Universally Composable Key Exchange / Dennis Hofheinz ; Jörn Müller-Quade ; Rainer Steinwandt
Multi-round Secure Light-Weight Broadcast Exclusion Protocol with Pre-processing / Yuji Watanabe ; Masayuki Numao
Precisely Answering Multi-dimensional Range Queries without Privacy Breaches / Lingyu Wang ; Yingjiu Li ; Duminda Wijesekera ; Sushil Jajodia
Passive Attack Analysis for Connection-Based Anonymity Systems / Andrei Serjantov ; Peter Sewell
Rapid Mixing and Security of Chaum's Visual Electronic Voting / Marcin Gomulkiewicz ; Marek Klonowski ; Miroslaw Kutylowski
Towards Accountable Management of Privacy and Identity Information / Marco Casassa Mont ; Siani Pearson ; Pete Bramhall
A Toolkit for Managing Enterprise Privacy Policies / Michael Backes ; Birgit Pfitzmann ; Matthias Schunter
Authenticating Mandatory Access Controls and Preserving Privacy for a High-Assurance Smart Card / Helmut Scherzer ; Ran Canetti ; Paul A. Karger ; Hugo Krawczyk ; Tal Rabin ; David C. Toll
Hardware Encapsulation of Security Services / Adrian Baldwin ; Simon Shiu
A Formal Security Model of the Infineon SLE 88 Smart Card Memory Management / David von Oheimb ; Georg Walter ; Volkmar Lotz
Bridging Model-Based and Language-Based Security / Rogardt Heldal ; Fredrik Hultin
An On-the-Fly Model-Checker for Security Protocol Analysis / David Basin ; Sebastian Mödersheim ; Luca Vigano
Symmetric Authentication within a Simulatable Cryptographic Library / Michael Waidner
An Improved Reference Flow Control Model for Policy-Based Intrusion Detection / Jacob Zimmermann ; Ludovic Mé ; Christophe Bidan
Visualisation for Intrusion Detection / Stefan Axelsson
On the Detection of Anomalous System Call Arguments / Christopher Kruegel ; Darren Mutz ; Fredrik Valeur ; Giovanni Vigna
Author Index
Signature and Access Control Policies for XML Documents / Elisa Bertino ; Elena Ferrari ; Loredana Parasiliti Provenza
Authorization and Access Control in Adaptive Workflows / Dulce Domingos ; António Rito-Silva ; Pedro Veiga
Flexible Regulation of Distributed Coalitions / Xuhui Ao ; Naftaly H. Minsky
10.

図書

図書
Jean-Jacques Quisquater ... [et al.]
出版情報: Berlin ; Tokyo : Springer, c1998  x, 375 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 1485
所蔵情報: loading…
目次情報: 続きを見る
Fixed vs. Variable-Length Patterns for Detecting Suspicious Process Behavior / H. Debar ; M. Dacier ; M. Nassehi ; A. Wespi
A Tool for Pro-active Defense Against the Buffer Overrun Attack / D. Bruschi ; E. Rosti ; R. Banfi
A Kernelized Architecture for Multilevel Secure Application Policies / S.N. Foley
Dealing with Multi-policy Security in Large Open Distributed Systems / C. Bidan ; V. Issarny
A Flexible Method for Information System Security Policy Specification / R. Ortalo
On the Security of Some Variants of the RSA Signature Scheme / M. Michels ; M. Stadler ; H.-M. Sun
Side Channel Cryptanalysis of Product Ciphers / J. Kelsey ; B. Schneier ; D. Wagner ; C. Hall
On the Security of Digital Tachographs / R. Anderson
An Authorization Model and Its Formal Semantics / E. Bertino ; F. Buccafurri ; E. Ferrari ; P. Rullo
Authorization in CORBA Security / G. Karjoth
Rules for Designing Multilevel Object-Oriented Databases / F. Cuppens ; A. Gabillon
Byte Code Verification for Java Smart Cards Based on Model Checking / J. Posegga ; H. Vogt
Towards Formalizing the Java Security Architecture of JDK 1.2 / L. L. Kassab ; S. J. Greenwald
EUROMED-JAVA: Trusted Third Party Services for Securing Medical Java Applets / A. Varvitsiotis ; D. Polemi ; A. Marsh
MPEG PTY-Marks: Cheap Detection of Embedded Copyright Data in
DVD-Video / J.P.M.G. Linnartz ; J.C. Talstra
DHWM: A Scheme for Managing Watermarking Keys in the Aquarelle
Multimedia Distributed System / D. Augot ; J.-F. Delaigle ; C. Fontaine
The "Ticket" Concept for Copy Control Based on Embedded Signalling
Panel Session: Watermarking / G. Eizenberg ; J.-J. Quisquater
Authentication and Payment in Future Mobile Systems / G. Horn ; B. Preneel
Distributed Temporary Pseudonyms: A New Approach for Protecting Location Information in Mobile Communication Networks / D. Kesdogan ; P. Reichl ; K. Junghartchen
A Mix-Mediated Anonymity Service and Its Payment / E. Franz ; A. Jerichow
A Subjective Metric of Authentication / A. Jøsang
A Sound Logic for Analysing Electronic Commerce Protocols / V. Kessler ; H. Neumann
Kerberos Version IV: Inductive Analysis of the Secrecy Goals / G. Bella ; L.C. Paulson
Author Index
Fixed vs. Variable-Length Patterns for Detecting Suspicious Process Behavior / H. Debar ; M. Dacier ; M. Nassehi ; A. Wespi
A Tool for Pro-active Defense Against the Buffer Overrun Attack / D. Bruschi ; E. Rosti ; R. Banfi
A Kernelized Architecture for Multilevel Secure Application Policies / S.N. Foley
文献の複写および貸借の依頼を行う
 文献複写・貸借依頼