ESORICS 2007 START Conference Manager    

European Symposium On Research In Computer Security

ESORICS 2007

Submission Page


To revise a previous submission, please type in its passcode below, and press the ENTER button.

   

If you lost the passcode for your submission, please click HERE.


Use the fields below to make your submission. Follow the instructions, and then use the 'Submit' button at the bottom of the form.


Title of Submission:  


List of Authors:

Please enter the complete list of authors for your submission, in the order in which they will appear on the abstract. You can add as many author slots as you want, to accommodate the total number of authors for your submission.

First name(s) Last name Email Institution
#1
#2
#3
#4
#5
#6
#7
#8
#9
#10
#11
#12
#13
#14
#15

More Authors      Fewer Authors


Contact Information:

Title 
First name*
Last name*
  Affiliation/organization*
       Affiliation Dept/Lab 
Phone*
Fax 
Email*
Building 
Mail Code 
Street Address 
City/Town*
State/Province 
Country*
Zip/Postal Code*


Abstract:

Type (or cut-and-paste) a short ASCII abstract for your submission. It should not include the author/title information, which was already entered above. You must enter plain ASCII text only, and you may not exceed 300 words.

 


Submit Paper:

Your submission must be in Adobe PDF (pdf) format, and the file name should end with the appropriate MIME extent (i.e., "pdf".). For example, your file could have a name such as "mypaper.pdf". If desired, the file may also be compressed in any standard format, with MIME extent corresponding to the compression type (eg., pdf.gz for a gzipped pdf file, etc.).

Find the file containing your submission: 


Keywords/Topics:

Please use the list of topics below to characterize your submission. Check all categories that seem appropriate.

security architecture
secure components
trusted computing modules
smartcard security
personal computing devices
network security
information system security
applications security
secure peer-to-peer connections
language-based security
access control
authorization
privileges
delegation
revocation
credentials
authentication
accountability
safety analysis
information control
data flow analysis
information flow analysis
inference analysis
covert channel analysis
applied cryptography
cryptographic protocol design
cryptographic protocol verification
authentication protocols
identity management
key distribution
tolerance and survivability
attack models
vulnerability analysis
intrusion detection
malware collection and analysis
security management
security requirements engineering
security policy specification
trust evaluation
security policy enforcement
secure electronic commerce
secure electronic administration
secure electronic government
digital rights management
intellectual property protection
privacy-enhancing technologies
secure electronic voting
formal methods in security
security models
security verification
 
 



  
START Conference Manager (V2.54.5)