ASAX: Software Architecture and Rule-Based Language for Universal Audit Trail
Analysis, Naji Habra, Baudouin Le Charlier, Isabelle Mathien, Mounji Abdelaziz, pp. 435-450, 1992.
DHWM: A Scheme for Managing Watermarking Keys in the Aquarelle Multimedia Distributed System, Daniel Augot, Jean-François Delaigle, Caroline Fontaine, pp. 241-255, 1998.
Verification of a Formal Security Model for Multiapplicative Smart Cards, Gerhard Schellhorn, Wolfgang Reif, Axel Schairer, Paul Karger, Vernon Austel, David Toll, pp. 17-36, 2000.
The ESPRIT Project CAFE - High Security Digital Payment Systems -, Jean-Paul Boly, Antoon Bosselaers, Ronald Cramer, Rolf Michelsen, Stig Mjølsnes, Frank Muller, Torben Pedersen, Birgit Pfitzmann, Peter de Rooij, Berry Schoenmakers, Matthias Schunter, Luc Vallée, Michael Waidner, pp. 217-230, 1994.
The ESPRIT Project CAFE - High Security Digital Payment Systems -, Jean-Paul Boly, Antoon Bosselaers, Ronald Cramer, Rolf Michelsen, Stig Mjølsnes, Frank Muller, Torben Pedersen, Birgit Pfitzmann, Peter de Rooij, Berry Schoenmakers, Matthias Schunter, Luc Vallée, Michael Waidner, pp. 217-230, 1994.
Harmonised Criteria for the Security Evaluation of IT Systems and Products, P. Casey, A. Brouwer, D. Herson, J.-F. Pacault, F. Taal, U. Van Essen, pp. 243-249, 1990.
Authenticating Mandatory Access Controls and Preserving Privacy for a High-Assurance Smart Card, Helmut Scherzer, Ran Canetti, Paul A. Karger, Hugo Krawczyk, Tal Rabin, David C. Toll, pp. 181-200, 2003.
Harmonised Criteria for the Security Evaluation of IT Systems and Products, P. Casey, A. Brouwer, D. Herson, J.-F. Pacault, F. Taal, U. Van Essen, pp. 243-249, 1990.
The ESPRIT Project CAFE - High Security Digital Payment Systems -, Jean-Paul Boly, Antoon Bosselaers, Ronald Cramer, Rolf Michelsen, Stig Mjølsnes, Frank Muller, Torben Pedersen, Birgit Pfitzmann, Peter de Rooij, Berry Schoenmakers, Matthias Schunter, Luc Vallée, Michael Waidner, pp. 217-230, 1994.
DHWM: A Scheme for Managing Watermarking Keys in the Aquarelle Multimedia Distributed System, Daniel Augot, Jean-François Delaigle, Caroline Fontaine, pp. 241-255, 1998.
An Object-Oriented View of Fragmented Data Processing for Fault and Intrusion
Tolerance in Distributed Systems, Jean-Charles Fabre, Brian Randell, pp. 193-208, 1992.
DHWM: A Scheme for Managing Watermarking Keys in the Aquarelle Multimedia Distributed System, Daniel Augot, Jean-François Delaigle, Caroline Fontaine, pp. 241-255, 1998.
The Development and Testing of the Identity-based Conference Key Distribution
System for the RHODOS Distributed System, Michael Wang, Andrzej Goscinski, pp. 209-228, 1992.
ASAX: Software Architecture and Rule-Based Language for Universal Audit Trail
Analysis, Naji Habra, Baudouin Le Charlier, Isabelle Mathien, Mounji Abdelaziz, pp. 435-450, 1992.
Harmonised Criteria for the Security Evaluation of IT Systems and Products, P. Casey, A. Brouwer, D. Herson, J.-F. Pacault, F. Taal, U. Van Essen, pp. 243-249, 1990.
A Fully Compliant Research Implementation of the P3P Standard for Privacy Protection: Experiences and Recommendations, Giles Hogben, Tom Jackson, Marc Wilikens, pp. 104-125, 2002.
A Fully Compliant Research Implementation of the P3P Standard for Privacy Protection: Experiences and Recommendations, Giles Hogben, Tom Jackson, Marc Wilikens, pp. 104-125, 2002.
Distributed Temporary Pseudonyms: A New Approach for Protecting Location Information in Mobile Communication Networks, Dogan Kesdogan, Peter Reichl, Klaus Junghärtchen, pp. 295-312, 1998.
Verification of a Formal Security Model for Multiapplicative Smart Cards, Gerhard Schellhorn, Wolfgang Reif, Axel Schairer, Paul Karger, Vernon Austel, David Toll, pp. 17-36, 2000.
Authenticating Mandatory Access Controls and Preserving Privacy for a High-Assurance Smart Card, Helmut Scherzer, Ran Canetti, Paul A. Karger, Hugo Krawczyk, Tal Rabin, David C. Toll, pp. 181-200, 2003.
Distributed Temporary Pseudonyms: A New Approach for Protecting Location Information in Mobile Communication Networks, Dogan Kesdogan, Peter Reichl, Klaus Junghärtchen, pp. 295-312, 1998.
Authenticating Mandatory Access Controls and Preserving Privacy for a High-Assurance Smart Card, Helmut Scherzer, Ran Canetti, Paul A. Karger, Hugo Krawczyk, Tal Rabin, David C. Toll, pp. 181-200, 2003.
ASAX: Software Architecture and Rule-Based Language for Universal Audit Trail
Analysis, Naji Habra, Baudouin Le Charlier, Isabelle Mathien, Mounji Abdelaziz, pp. 435-450, 1992.
ASAX: Software Architecture and Rule-Based Language for Universal Audit Trail
Analysis, Naji Habra, Baudouin Le Charlier, Isabelle Mathien, Mounji Abdelaziz, pp. 435-450, 1992.
The ESPRIT Project CAFE - High Security Digital Payment Systems -, Jean-Paul Boly, Antoon Bosselaers, Ronald Cramer, Rolf Michelsen, Stig Mjølsnes, Frank Muller, Torben Pedersen, Birgit Pfitzmann, Peter de Rooij, Berry Schoenmakers, Matthias Schunter, Luc Vallée, Michael Waidner, pp. 217-230, 1994.
The ESPRIT Project CAFE - High Security Digital Payment Systems -, Jean-Paul Boly, Antoon Bosselaers, Ronald Cramer, Rolf Michelsen, Stig Mjølsnes, Frank Muller, Torben Pedersen, Birgit Pfitzmann, Peter de Rooij, Berry Schoenmakers, Matthias Schunter, Luc Vallée, Michael Waidner, pp. 217-230, 1994.
Limitations of the Approach of Solving a Network's Security Problems with a Firewall, Stefano Zatti, Refik Molva, Angelo Tosi, Gene Tsudik, pp. 144-145, 1996.
The ESPRIT Project CAFE - High Security Digital Payment Systems -, Jean-Paul Boly, Antoon Bosselaers, Ronald Cramer, Rolf Michelsen, Stig Mjølsnes, Frank Muller, Torben Pedersen, Birgit Pfitzmann, Peter de Rooij, Berry Schoenmakers, Matthias Schunter, Luc Vallée, Michael Waidner, pp. 217-230, 1994.
Harmonised Criteria for the Security Evaluation of IT Systems and Products, P. Casey, A. Brouwer, D. Herson, J.-F. Pacault, F. Taal, U. Van Essen, pp. 243-249, 1990.
The ESPRIT Project CAFE - High Security Digital Payment Systems -, Jean-Paul Boly, Antoon Bosselaers, Ronald Cramer, Rolf Michelsen, Stig Mjølsnes, Frank Muller, Torben Pedersen, Birgit Pfitzmann, Peter de Rooij, Berry Schoenmakers, Matthias Schunter, Luc Vallée, Michael Waidner, pp. 217-230, 1994.
The ESPRIT Project CAFE - High Security Digital Payment Systems -, Jean-Paul Boly, Antoon Bosselaers, Ronald Cramer, Rolf Michelsen, Stig Mjølsnes, Frank Muller, Torben Pedersen, Birgit Pfitzmann, Peter de Rooij, Berry Schoenmakers, Matthias Schunter, Luc Vallée, Michael Waidner, pp. 217-230, 1994.
Authenticating Mandatory Access Controls and Preserving Privacy for a High-Assurance Smart Card, Helmut Scherzer, Ran Canetti, Paul A. Karger, Hugo Krawczyk, Tal Rabin, David C. Toll, pp. 181-200, 2003.
An Object-Oriented View of Fragmented Data Processing for Fault and Intrusion
Tolerance in Distributed Systems, Jean-Charles Fabre, Brian Randell, pp. 193-208, 1992.
How Much Negociation and Detail Can Users Handle? Experiences with Security Negociation and the Granularity of Access Control in Communications, Kai Rannenberg, pp. 37-54, 2000.
Inter-Packet Delay Based Correlation for Tracing Encrypted Connections Through Stepping Stones, Xinyuan Wang, Douglas S. Reeves, S. Felix Wu, pp. 244-263, 2002.
Distributed Temporary Pseudonyms: A New Approach for Protecting Location Information in Mobile Communication Networks, Dogan Kesdogan, Peter Reichl, Klaus Junghärtchen, pp. 295-312, 1998.
Verification of a Formal Security Model for Multiapplicative Smart Cards, Gerhard Schellhorn, Wolfgang Reif, Axel Schairer, Paul Karger, Vernon Austel, David Toll, pp. 17-36, 2000.
The ESPRIT Project CAFE - High Security Digital Payment Systems -, Jean-Paul Boly, Antoon Bosselaers, Ronald Cramer, Rolf Michelsen, Stig Mjølsnes, Frank Muller, Torben Pedersen, Birgit Pfitzmann, Peter de Rooij, Berry Schoenmakers, Matthias Schunter, Luc Vallée, Michael Waidner, pp. 217-230, 1994.
Supporting Object-based High-assurance Write-up in Multilevel Databases for
the Replicated Architecture, Roshan K. Thomas, Ravi S. Sandhu, pp. 403-428, 1994.
Verification of a Formal Security Model for Multiapplicative Smart Cards, Gerhard Schellhorn, Wolfgang Reif, Axel Schairer, Paul Karger, Vernon Austel, David Toll, pp. 17-36, 2000.
Verification of a Formal Security Model for Multiapplicative Smart Cards, Gerhard Schellhorn, Wolfgang Reif, Axel Schairer, Paul Karger, Vernon Austel, David Toll, pp. 17-36, 2000.
Authenticating Mandatory Access Controls and Preserving Privacy for a High-Assurance Smart Card, Helmut Scherzer, Ran Canetti, Paul A. Karger, Hugo Krawczyk, Tal Rabin, David C. Toll, pp. 181-200, 2003.
The ESPRIT Project CAFE - High Security Digital Payment Systems -, Jean-Paul Boly, Antoon Bosselaers, Ronald Cramer, Rolf Michelsen, Stig Mjølsnes, Frank Muller, Torben Pedersen, Birgit Pfitzmann, Peter de Rooij, Berry Schoenmakers, Matthias Schunter, Luc Vallée, Michael Waidner, pp. 217-230, 1994.
The ESPRIT Project CAFE - High Security Digital Payment Systems -, Jean-Paul Boly, Antoon Bosselaers, Ronald Cramer, Rolf Michelsen, Stig Mjølsnes, Frank Muller, Torben Pedersen, Birgit Pfitzmann, Peter de Rooij, Berry Schoenmakers, Matthias Schunter, Luc Vallée, Michael Waidner, pp. 217-230, 1994.
Harmonised Criteria for the Security Evaluation of IT Systems and Products, P. Casey, A. Brouwer, D. Herson, J.-F. Pacault, F. Taal, U. Van Essen, pp. 243-249, 1990.
Supporting Object-based High-assurance Write-up in Multilevel Databases for
the Replicated Architecture, Roshan K. Thomas, Ravi S. Sandhu, pp. 403-428, 1994.
Verification of a Formal Security Model for Multiapplicative Smart Cards, Gerhard Schellhorn, Wolfgang Reif, Axel Schairer, Paul Karger, Vernon Austel, David Toll, pp. 17-36, 2000.
Authenticating Mandatory Access Controls and Preserving Privacy for a High-Assurance Smart Card, Helmut Scherzer, Ran Canetti, Paul A. Karger, Hugo Krawczyk, Tal Rabin, David C. Toll, pp. 181-200, 2003.
Limitations of the Approach of Solving a Network's Security Problems with a Firewall, Stefano Zatti, Refik Molva, Angelo Tosi, Gene Tsudik, pp. 144-145, 1996.
Limitations of the Approach of Solving a Network's Security Problems with a Firewall, Stefano Zatti, Refik Molva, Angelo Tosi, Gene Tsudik, pp. 144-145, 1996.
The ESPRIT Project CAFE - High Security Digital Payment Systems -, Jean-Paul Boly, Antoon Bosselaers, Ronald Cramer, Rolf Michelsen, Stig Mjølsnes, Frank Muller, Torben Pedersen, Birgit Pfitzmann, Peter de Rooij, Berry Schoenmakers, Matthias Schunter, Luc Vallée, Michael Waidner, pp. 217-230, 1994.
Harmonised Criteria for the Security Evaluation of IT Systems and Products, P. Casey, A. Brouwer, D. Herson, J.-F. Pacault, F. Taal, U. Van Essen, pp. 243-249, 1990.
The ESPRIT Project CAFE - High Security Digital Payment Systems -, Jean-Paul Boly, Antoon Bosselaers, Ronald Cramer, Rolf Michelsen, Stig Mjølsnes, Frank Muller, Torben Pedersen, Birgit Pfitzmann, Peter de Rooij, Berry Schoenmakers, Matthias Schunter, Luc Vallée, Michael Waidner, pp. 217-230, 1994.
The Development and Testing of the Identity-based Conference Key Distribution
System for the RHODOS Distributed System, Michael Wang, Andrzej Goscinski, pp. 209-228, 1992.
Inter-Packet Delay Based Correlation for Tracing Encrypted Connections Through Stepping Stones, Xinyuan Wang, Douglas S. Reeves, S. Felix Wu, pp. 244-263, 2002.
A Fully Compliant Research Implementation of the P3P Standard for Privacy Protection: Experiences and Recommendations, Giles Hogben, Tom Jackson, Marc Wilikens, pp. 104-125, 2002.
Inter-Packet Delay Based Correlation for Tracing Encrypted Connections Through Stepping Stones, Xinyuan Wang, Douglas S. Reeves, S. Felix Wu, pp. 244-263, 2002.
Limitations of the Approach of Solving a Network's Security Problems with a Firewall, Stefano Zatti, Refik Molva, Angelo Tosi, Gene Tsudik, pp. 144-145, 1996.