Sign in
ETRICS
2006
2006
2006
Keyphrases
Publications
2006
Wolfgang Hommel
Policy-Based Integration of User and Provider-Sided Identity Management.
ETRICS
(2006)
Rainer Böhme
A Comparison of Market Approaches to Software Vulnerability Disclosure.
ETRICS
(2006)
Nicolai Kuntze
,
Andreas U. Schmidt
Transitive Trust in Mobile Scenarios.
ETRICS
(2006)
Almudena Alcaide
,
Juan M. Estévez-Tapiador
,
Julio César Hernández Castro
,
Arturo Ribagorda
An Extended Model of Rational Exchange Based on Dynamic Games of Imperfect Information.
ETRICS
(2006)
Steffen Kolarczyk
,
Manuel Koch
,
Klaus-Peter Löhr
,
Karl Pauls
SecTOOL - Supporting Requirements Engineering for Access Control.
ETRICS
(2006)
Andreas Pfitzmann
Multilateral Security: Enabling Technologies and Their Evaluation.
ETRICS
(2006)
Martin Wimmer
,
Martina-Cezara Albutiu
,
Alfons Kemper
Optimized Workflow Authorization in Service Oriented Architectures.
ETRICS
(2006)
Dieter Hutter
Possibilistic Information Flow Control in MAKS and Action Refinement.
ETRICS
(2006)
Carsten Hohendorf
,
Erwin P. Rathgeb
,
Esbold Unurkhaan
,
Michael Tüxen
Secure End-to-End Transport over SCTP.
ETRICS
(2006)
Holger Grandy
,
Dominik Haneberg
,
Wolfgang Reif
,
Kurt Stenzel
Developing Provable Secure M-Commerce Applications.
ETRICS
(2006)
Sebastian Clauß
A Framework for Quantification of Linkability Within a Privacy-Enhancing Identity Management System.
ETRICS
(2006)
Igor Fischer
,
Thorsten Herfet
Visual Document Authentication Using Human-Recognizable Watermarks.
ETRICS
(2006)
Paul E. Sevinç
,
David A. Basin
,
Ernst-Rüdiger Olderog
Controlling Access to Documents: A Formal Access Control Model.
ETRICS
(2006)
Stefan Köpsell
Low Latency Anonymous Communication - How Long Are Users Willing to Wait?.
ETRICS
(2006)
Francesco Palmieri
Dynamic Layer-2 VPN Services for Improving Security in the Grid Environment.
ETRICS
(2006)
Dominik Raub
,
Rainer Steinwandt
An Algebra for Enterprise Privacy Policies Closed Under Composition and Conjunction.
ETRICS
(2006)
Arthur Schmidt
Quantum Algorithm for Solving the Discrete Logarithm Problem in the Class Group of an Imaginary Quadratic Field and Security Comparison of Current Cryptosystems at the Beginning of Quantum Computer Age.
ETRICS
(2006)
Esther Palomar
,
Juan M. Estévez-Tapiador
,
Julio César Hernández Castro
,
Arturo Ribagorda
A P2P Content Authentication Protocol Based on Byzantine Agreement.
ETRICS
(2006)
Denis Hatebur
,
Maritta Heisel
,
Holger Schmidt
Security Engineering Using Problem Frames.
ETRICS
(2006)
Sebastian Schmerl
,
Hartmut König
,
Ulrich Flegel
,
Michael Meier
Simplifying Signature Engineering by Reuse.
ETRICS
(2006)
Marko Hassinen
,
Konstantin Hyppönen
,
Keijo Haataja
An Open, PKI-Based Mobile Payment System.
ETRICS
(2006)
Jun Qian
,
Chao Xu
,
Meilin Shi
Redesign and Implementation of Evaluation Dataset for Intrusion Detection System.
ETRICS
(2006)
Jürgen Nützel
,
Anja Beyer
How to Increase the Security of Digital Rights Management Systems Without Affecting Consumer's Security.
ETRICS
(2006)
Ihab Hamadeh
,
George Kesidis
Toward a Framework for Forensic Analysis of Scanning Worms.
ETRICS
(2006)
Shyong K. Lam
,
Dan Frankowski
,
John Riedl
Do You Trust Your Recommendations? An Exploration of Security and Privacy Issues in Recommender Systems.
ETRICS
(2006)
Stefan Köpsell
,
Rolf Wendolsky
,
Hannes Federrath
Revocable Anonymity.
ETRICS
(2006)
Jim Dowd
,
Shouhuai Xu
,
Weining Zhang
Privacy-Preserving Decision Tree Mining Based on Random Substitutions.
ETRICS
(2006)
Ulrich Flegel
,
Joachim Biskup
Requirements of Information Reductions for Cooperating Intrusion Detection Agents.
ETRICS
(2006)
Young-Sik Hwang
,
Seung Wan Han
,
Taek Yong Nam
Secure Rejoining Scheme for Dynamic Sensor Networks.
ETRICS
(2006)
Sven Wohlgemuth
,
Günter Müller
Privacy with Delegation of Rights by Identity Management.
ETRICS
(2006)
Marcin Gogolewski
,
Marek Klonowski
,
Przemyslaw Kubiak
,
Miroslaw Kutylowski
,
Anna Lauks
,
Filip Zagórski
Kleptographic Attacks on E-Voting Schemes.
ETRICS
(2006)
Florian Kerschbaum
,
Orestis Terzidis
Filtering for Private Collaborative Benchmarking.
ETRICS
(2006)
Kathrin Lehmann
,
Peter Thiemann
Field Access Analysis for Enforcing Access Control Policies.
ETRICS
(2006)
Michael Barnett
,
David A. Naumann
,
Wolfram Schulte
,
Qi Sun
Allowing State Changes in Specifications.
ETRICS
(2006)
Woojin Chang
Reliable Keystroke Biometric System Based on a Small Number of Keystroke Samples.
ETRICS
(2006)
Fernando Godínez
,
Dieter Hutter
,
Raúl Monroy
On the Use of Word Networks to Mimicry Attack Detection.
ETRICS
(2006)
volume 3995, 2006
Emerging Trends in Information and Communication Security, International Conference, ETRICS 2006, Freiburg, Germany, June 6-9, 2006, Proceedings
ETRICS
3995 (2006)