Skip to main content
  • Conference proceedings
  • © 1998

Computer Security - ESORICS 98

5th European Symposium on Research in Computer Security, Louvain-la-Neuve, Belgium, September 16-18, 1998, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 1485)

Conference series link(s): ESORICS: European Symposium on Research in Computer Security

Conference proceedings info: ESORICS 1998.

Buy it now

Buying options

Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (24 papers)

  1. Front Matter

  2. Fixed vs. variable-length patterns for detecting suspicious process behavior

    • Hervé Debar, Marc Dacier, Mehdi Nassehi, Andreas Wespi
    Pages 1-15
  3. A tool for pro-active defense against the buffer overrun attack

    • D. Bruschi, E. Rosti, R. Banfi
    Pages 17-31
  4. Dealing with multi-policy security in large open distributed systems

    • Christophe Bidan, Valérie Issarny
    Pages 51-66
  5. On the security of some variants of the RSA signature scheme

    • Markus Michels, Markus Stadler, Hung -Min Sun
    Pages 85-96
  6. Side channel cryptanalysis of product ciphers

    • John Kelsey, Bruce Schneier, David Wagner, Chris Hall
    Pages 97-110
  7. On the security of digital tachographs

    • Ross Anderson
    Pages 111-125
  8. An authorization model and its formal semantics

    • Elisa Bertino, Francesco Buccafurri, Elena Ferrari, Pasquale Rullo
    Pages 127-142
  9. Authorization in CORBA security

    • Günter Karjoth
    Pages 143-158
  10. Rules for designing multilevel Object-Oriented Databases

    • Frédéric Cuppens, Alban Gabillon
    Pages 159-174
  11. Byte code verification for Java smart cards based on model checking

    • Joachim Posegga, Harald Vogt
    Pages 175-190
  12. Towards formalizing the Java security architecture of JDK 1.2

    • Lora L. Kassab, Steven J. Greenwald
    Pages 191-207
  13. EUROMED-JAVA: Trusted Third Party Services for securing medical Java applets

    • Angelos Varvitsiotis, Despina Polemi, Andy Marsh
    Pages 209-220
  14. MPEG PTY-Marks: Cheap detection of embedded copyright data in DVD-video

    • J. P. M. G. Linnartz, J. C. Talstra
    Pages 221-240
  15. DHWM: A scheme for managing watermarking keys in the Aquarelle multimedia distributed system

    • Daniel Augot, Jean -FranÇois Delaigle, Caroline Fontaine
    Pages 241-255
  16. Panel session: Watermarking

    • Gérard Eizenberg, Jean -Jacques Quisquater
    Pages 275-275
  17. Authentication and payment in future mobile systems

    • Günther Horn, Bart Preneel
    Pages 277-293

Other Volumes

  1. Computer Security — ESORICS 98

About this book

This book constitutes the refereed proceedings of the 5th European Symposium on Research in Computer Security, ESORICS 98, held in Louvain-la-Neuve, Belgium, in September 1998.
The 24 revised full papers presented were carefully reviewed and selected from a total of 57 submissions. The papers provide current results from research and development in design and specification of security policies, access control modelling and protocol analysis, mobile systems and anonymity, Java and mobile code, watermarking, intrusion detection and prevention, and specific threads.

Bibliographic Information

  • Book Title: Computer Security - ESORICS 98

  • Book Subtitle: 5th European Symposium on Research in Computer Security, Louvain-la-Neuve, Belgium, September 16-18, 1998, Proceedings

  • Editors: Jean-Jacques Quisquater, Yves Deswarte, Catherine Meadows, Dieter Gollmann

  • Series Title: Lecture Notes in Computer Science

  • DOI: https://doi.org/10.1007/BFb0055851

  • Publisher: Springer Berlin, Heidelberg

  • eBook Packages: Springer Book Archive

  • Copyright Information: Springer-Verlag Berlin Heidelberg 1998

  • Softcover ISBN: 978-3-540-65004-1Published: 02 September 1998

  • eBook ISBN: 978-3-540-49784-4Published: 14 January 2005

  • Series ISSN: 0302-9743

  • Series E-ISSN: 1611-3349

  • Edition Number: 1

  • Number of Pages: X, 382

  • Topics: Cryptology, Operating Systems, Management of Computing and Information Systems, Computer Communication Networks

Buy it now

Buying options

Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access