Bit-Slice Auction Circuit (English)
- New search for: Kurosawa, K.
- New search for: Ogata, W.
- New search for: Swiss Federal Institute of Technology (ETH)
- New search for: IBM Zurich Research Laboratory
- New search for: Kurosawa, K.
- New search for: Ogata, W.
- New search for: Gollmann, D.
- New search for: Karjoth, G.
- New search for: Waidner, M.
- New search for: Swiss Federal Institute of Technology (ETH)
- New search for: IBM Zurich Research Laboratory
In:
Research in computer security; ESORICS 2002
;
24-38
;
2002
-
ISBN:
-
ISSN:
- Conference paper / Print
-
Title:Bit-Slice Auction Circuit
-
Contributors:Kurosawa, K. ( author ) / Ogata, W. ( author ) / Gollmann, D. / Karjoth, G. / Waidner, M. / Swiss Federal Institute of Technology (ETH) / IBM Zurich Research Laboratory
-
Conference:European symposium; 7th, Research in computer security; ESORICS 2002 ; 2002 ; Zurich, Switzerland
-
Published in:
-
Publisher:
- New search for: Springer
-
Place of publication:New York
-
Publication date:2002-01-01
-
Size:15 pages
-
ISBN:
-
ISSN:
-
Type of media:Conference paper
-
Type of material:Print
-
Language:English
-
Keywords:
-
Source:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Computational Probabilistic Non-interferenceBackes, M. / Pfitzmann, B. / Swiss Federal Institute of Technology (ETH) / IBM Zurich Research Laboratory et al. | 2002
- 24
-
Bit-Slice Auction CircuitKurosawa, K. / Ogata, W. / Swiss Federal Institute of Technology (ETH) / IBM Zurich Research Laboratory et al. | 2002
- 39
-
Confidentiality Policies and Their Enforcement for Controlled Query EvaluationBiskup, J. / Bonatti, P. / Swiss Federal Institute of Technology (ETH) / IBM Zurich Research Laboratory et al. | 2002
- 55
-
Cardinality-Based Inference Control in Sum-Only Data CubesWang, L. / Wijesekera, D. / Jajodia, S. / Swiss Federal Institute of Technology (ETH) / IBM Zurich Research Laboratory et al. | 2002
- 72
-
Outbound Authentication for Programmable Secure CoprocessorsSmith, S. W. / Swiss Federal Institute of Technology (ETH) / IBM Zurich Research Laboratory et al. | 2002
- 90
-
Hamming Weight Attacks on Cryptographic Hardware - Breaking Masking DefenseGomulkiewicz, M. / Kutylowski, M. / Swiss Federal Institute of Technology (ETH) / IBM Zurich Research Laboratory et al. | 2002
- 104
-
A Fully Compliant Research Implementation of the P3P Standard for Privacy Protection: Experiences and RecommendationsHogben, G. / Jackson, T. / Wilikens, M. / Swiss Federal Institute of Technology (ETH) / IBM Zurich Research Laboratory et al. | 2002
- 126
-
Authentication for Distributed Web CachesGiles, J. / Sailer, R. / Verma, D. / Chari, S. / Swiss Federal Institute of Technology (ETH) / IBM Zurich Research Laboratory et al. | 2002
- 146
-
Analysing a Stream Authentication Protocol Using Model CheckingBroadfoot, P. / Lowe, G. / Swiss Federal Institute of Technology (ETH) / IBM Zurich Research Laboratory et al. | 2002
- 162
-
Equal To The Task?Heather, J. / Schneider, S. / Swiss Federal Institute of Technology (ETH) / IBM Zurich Research Laboratory et al. | 2002
- 178
-
TINMAN: A Resource Bound Security Checking System for Mobile CodeMok, A. K. / Yu, W. / Swiss Federal Institute of Technology (ETH) / IBM Zurich Research Laboratory et al. | 2002
- 194
-
Confidentiality-Preserving Refinement is Compositional - SometimesSanten, T. / Heisel, M. / Pfitzmann, A. / Swiss Federal Institute of Technology (ETH) / IBM Zurich Research Laboratory et al. | 2002
- 212
-
Formal Security Analysis with Interacting State Machinesvon Oheimb, D. / Lotz, V. / Swiss Federal Institute of Technology (ETH) / IBM Zurich Research Laboratory et al. | 2002
- 229
-
Decidability of Safety in Graph-Based Models for Access ControlKoch, M. / Mancini, L. V. / Parisi-Presicce, F. / Swiss Federal Institute of Technology (ETH) / IBM Zurich Research Laboratory et al. | 2002
- 244
-
Inter-Packet Delay Based Correlation for Tracing Encrypted Connections through Stepping StonesWang, X. / Reeves, D. S. / Wu, S. F. / Swiss Federal Institute of Technology (ETH) / IBM Zurich Research Laboratory et al. | 2002
- 264
-
Learning Fingerprints for a Database Intrusion Detection SystemLee, S. Y. / Low, W. L. / Wong, P. Y. / Swiss Federal Institute of Technology (ETH) / IBM Zurich Research Laboratory et al. | 2002