START Conference Manager    

European Symposium On Research In Computer Security

ESORICS 2006

Submission Page


To revise a previous submission, please type in its passcode below, and press the ENTER button.

   

If you lost the passcode for your submission, please click HERE.


Use the fields below to make your submission. Follow the instructions, and then use the 'Submit' button at the bottom of the form.


Title of Submission:  


List of Authors:

Please enter the complete list of authors for your submission, in the order in which they will appear on the abstract. You can add as many author slots as you want, to accommodate the total number of authors for your submission.

First name(s) Last name Email Institution
#1
#2
#3
#4
#5
#6
#7
#8
#9
#10
#11
#12
#13
#14
#15

More Authors      Fewer Authors


Contact Information:

Title 
First name*
Last name*
  Affiliation/organization*
       Affiliation Dept/Lab 
Phone*
Fax 
Email*
Building 
Mail Code 
Street Address 
City/Town*
State/Province 
Country*
Zip/Postal Code*


Summary:

Type (or cut-and-paste) a short ASCII summary for your submission. It should not include the author/title information, which was already entered above. You must enter plain ASCII text only, and you may not exceed 300 words.

 


Submit Paper:

Your submission must be in one of the following document formats:

  • Adobe PDF (pdf)
  • Postscript (ps)

The file's name should have the proper MIME extent associated with its document type. For example, a pdf file could have a name such as "mypaper.pdf". If desired, the file may also be compressed in any standard format, with MIME extent corresponding to the compression type (eg., pdf.gz for a gzipped pdf file, etc.).

Find the file containing your submission: 


Keywords/Topics:

Please use the list of topics below to characterize your submission. Check all categories that seem appropriate.

access control
accountability
applied cryptography
authentication
covert channels
cryptographic protocols
cybercrime
data and application security
denial of service attacks
digital rights management
distributed trust management
formal methods in security
identity management
inference control
information assurance
information dissemination control
information flow control
information warfare
intellectual property protection
intrusion tolerance
language-based security
network security
peer-to-peer security
privacy-enhancing technology
secure electronic commerce
security as quality of service
security evaluation
security management
security models
security requirements engineering
smartcards
subliminal channels
system security
trust models
trustworthy user devices
 
 



START Conference Manager (V2.61.0 - Rev. 6300)