Outbound Authentication for Programmable Secure Coprocessors (Englisch)
- Neue Suche nach: Smith, S. W.
- Neue Suche nach: Swiss Federal Institute of Technology (ETH)
- Neue Suche nach: IBM Zurich Research Laboratory
- Neue Suche nach: Smith, S. W.
- Neue Suche nach: Gollmann, D.
- Neue Suche nach: Karjoth, G.
- Neue Suche nach: Waidner, M.
- Neue Suche nach: Swiss Federal Institute of Technology (ETH)
- Neue Suche nach: IBM Zurich Research Laboratory
In:
Research in computer security; ESORICS 2002
;
72-89
;
2002
-
ISBN:
-
ISSN:
- Aufsatz (Konferenz) / Print
-
Titel:Outbound Authentication for Programmable Secure Coprocessors
-
Beteiligte:
-
Kongress:European symposium; 7th, Research in computer security; ESORICS 2002 ; 2002 ; Zurich, Switzerland
-
Erschienen in:
-
Verlag:
- Neue Suche nach: Springer
-
Erscheinungsort:New York
-
Erscheinungsdatum:01.01.2002
-
Format / Umfang:18 pages
-
ISBN:
-
ISSN:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Print
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Inhaltsverzeichnis Konferenzband
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Computational Probabilistic Non-interferenceBackes, M. / Pfitzmann, B. / Swiss Federal Institute of Technology (ETH) / IBM Zurich Research Laboratory et al. | 2002
- 24
-
Bit-Slice Auction CircuitKurosawa, K. / Ogata, W. / Swiss Federal Institute of Technology (ETH) / IBM Zurich Research Laboratory et al. | 2002
- 39
-
Confidentiality Policies and Their Enforcement for Controlled Query EvaluationBiskup, J. / Bonatti, P. / Swiss Federal Institute of Technology (ETH) / IBM Zurich Research Laboratory et al. | 2002
- 55
-
Cardinality-Based Inference Control in Sum-Only Data CubesWang, L. / Wijesekera, D. / Jajodia, S. / Swiss Federal Institute of Technology (ETH) / IBM Zurich Research Laboratory et al. | 2002
- 72
-
Outbound Authentication for Programmable Secure CoprocessorsSmith, S. W. / Swiss Federal Institute of Technology (ETH) / IBM Zurich Research Laboratory et al. | 2002
- 90
-
Hamming Weight Attacks on Cryptographic Hardware - Breaking Masking DefenseGomulkiewicz, M. / Kutylowski, M. / Swiss Federal Institute of Technology (ETH) / IBM Zurich Research Laboratory et al. | 2002
- 104
-
A Fully Compliant Research Implementation of the P3P Standard for Privacy Protection: Experiences and RecommendationsHogben, G. / Jackson, T. / Wilikens, M. / Swiss Federal Institute of Technology (ETH) / IBM Zurich Research Laboratory et al. | 2002
- 126
-
Authentication for Distributed Web CachesGiles, J. / Sailer, R. / Verma, D. / Chari, S. / Swiss Federal Institute of Technology (ETH) / IBM Zurich Research Laboratory et al. | 2002
- 146
-
Analysing a Stream Authentication Protocol Using Model CheckingBroadfoot, P. / Lowe, G. / Swiss Federal Institute of Technology (ETH) / IBM Zurich Research Laboratory et al. | 2002
- 162
-
Equal To The Task?Heather, J. / Schneider, S. / Swiss Federal Institute of Technology (ETH) / IBM Zurich Research Laboratory et al. | 2002
- 178
-
TINMAN: A Resource Bound Security Checking System for Mobile CodeMok, A. K. / Yu, W. / Swiss Federal Institute of Technology (ETH) / IBM Zurich Research Laboratory et al. | 2002
- 194
-
Confidentiality-Preserving Refinement is Compositional - SometimesSanten, T. / Heisel, M. / Pfitzmann, A. / Swiss Federal Institute of Technology (ETH) / IBM Zurich Research Laboratory et al. | 2002
- 212
-
Formal Security Analysis with Interacting State Machinesvon Oheimb, D. / Lotz, V. / Swiss Federal Institute of Technology (ETH) / IBM Zurich Research Laboratory et al. | 2002
- 229
-
Decidability of Safety in Graph-Based Models for Access ControlKoch, M. / Mancini, L. V. / Parisi-Presicce, F. / Swiss Federal Institute of Technology (ETH) / IBM Zurich Research Laboratory et al. | 2002
- 244
-
Inter-Packet Delay Based Correlation for Tracing Encrypted Connections through Stepping StonesWang, X. / Reeves, D. S. / Wu, S. F. / Swiss Federal Institute of Technology (ETH) / IBM Zurich Research Laboratory et al. | 2002
- 264
-
Learning Fingerprints for a Database Intrusion Detection SystemLee, S. Y. / Low, W. L. / Wong, P. Y. / Swiss Federal Institute of Technology (ETH) / IBM Zurich Research Laboratory et al. | 2002