Login / Signup
ESORICS
1990
1995
2005
2013
1990
2013
Keyphrases
Publications
2013
Lei Wei
,
Michael K. Reiter
Ensuring File Authenticity in Private DFA Evaluation on Encrypted Files in the Cloud.
ESORICS
(2013)
Aron Laszka
,
Benjamin Johnson
,
Pascal Schöttle
,
Jens Grossklags
,
Rainer Böhme
Managing the Weakest Link - A Game-Theoretic Approach for the Mitigation of Insider Threats.
ESORICS
(2013)
Limin Jia
,
Jassim Aljuraidan
,
Elli Fragkaki
,
Lujo Bauer
,
Michael Stroucken
,
Kazuhide Fukushima
,
Shinsaku Kiyomoto
,
Yutaka Miyake
Run-Time Enforcement of Information-Flow Properties on Android - (Extended Abstract).
ESORICS
(2013)
Devdatta Akhawe
,
Frank Li
,
Warren He
,
Prateek Saxena
,
Dawn Song
Data-Confined HTML5 Applications.
ESORICS
(2013)
Marco Valerio Barbera
,
Vasileios P. Kemerlis
,
Vasilis Pappas
,
Angelos D. Keromytis
CellFlood: Attacking Tor Onion Routers on the Cheap.
ESORICS
(2013)
Jun Dai
,
Xiaoyan Sun
,
Peng Liu
Patrol: Revealing Zero-Day Attack Paths through Network-Wide System Object Dependencies.
ESORICS
(2013)
Amir Herzberg
,
Haya Shulman
Vulnerable Delegation of DNS Resolution.
ESORICS
(2013)
Mishari Al Mishari
,
Paolo Gasti
,
Gene Tsudik
,
Ekin Oguz
Privacy-Preserving Matching of Community-Contributed Content.
ESORICS
(2013)
Phani Vadrevu
,
Babak Rahbarinia
,
Roberto Perdisci
,
Kang Li
,
Manos Antonakakis
Measuring and Detecting Malware Downloads in Live Network Traffic.
ESORICS
(2013)
Edouard Cuvelier
,
Olivier Pereira
,
Thomas Peters
Election Verifiability or Ballot Privacy: Do We Need to Choose?
ESORICS
(2013)
Steve Kremer
,
Robert Künnemann
,
Graham Steel
Universally Composable Key-Management.
ESORICS
(2013)
Colin Boyd
,
Cas Cremers
,
Michèle Feltz
,
Kenneth G. Paterson
,
Bertram Poettering
,
Douglas Stebila
ASICS: Authenticated Key Exchange Security Incorporating Certification Systems.
ESORICS
(2013)
Giorgia Azzurra Marson
,
Bertram Poettering
Practical Secure Logging: Seekable Sequential Key Generators.
ESORICS
(2013)
Michael Carl Tschantz
,
Anupam Datta
,
Jeannette M. Wing
Purpose Restrictions on Information Use.
ESORICS
(2013)
Martin Gagné
,
Pascal Lafourcade
,
Yassine Lakhnech
Automated Security Proofs for Almost-Universal Hash for MAC Verification.
ESORICS
(2013)
Naipeng Dong
,
Hugo Jonker
,
Jun Pang
Enforcing Privacy in the Presence of Others: Notions, Formalisations and Relations.
ESORICS
(2013)
Jinpeng Wei
,
Feng Zhu
,
Calton Pu
KQguard: Binary-Centric Defense against Kernel Queue Injection Attacks.
ESORICS
(2013)
Xinshu Dong
,
Hong Hu
,
Prateek Saxena
,
Zhenkai Liang
A Quantitative Evaluation of Privilege Separation in Web Browser Designs.
ESORICS
(2013)
Jonathan Crussell
,
Clint Gibler
,
Hao Chen
AnDarwin: Scalable Detection of Semantically Similar Android Applications.
ESORICS
(2013)
Jan Camenisch
,
Robert R. Enderlein
,
Victor Shoup
Practical and Employable Protocols for UC-Secure Circuit Evaluation over ℤn.
ESORICS
(2013)
Jun Furukawa
Request-Based Comparable Encryption.
ESORICS
(2013)
Hugo Daniel Macedo
,
Tayssir Touili
Mining Malware Specifications through Static Reachability Analysis.
ESORICS
(2013)
Dan Caselden
,
Alex Bazhanyuk
,
Mathias Payer
,
Stephen McCamant
,
Dawn Song
HI-CFG: Construction by Binary Analysis and Application to Attack Polymorphism.
ESORICS
(2013)
Mathias Humbert
,
Théophile Studer
,
Matthias Grossglauser
,
Jean-Pierre Hubaux
Nowhere to Hide: Navigating around Privacy in Online Social Networks.
ESORICS
(2013)
Yossef Oren
,
Dvir Schirman
,
Avishai Wool
Range Extension Attacks on Contactless Smart Cards.
ESORICS
(2013)
Youngja Park
,
Christopher S. Gates
,
Stephen C. Gates
Estimating Asset Sensitivity by Profiling Users.
ESORICS
(2013)
Shane S. Clark
,
Hossen A. Mustafa
,
Benjamin Ransford
,
Jacob Sorber
,
Kevin Fu
,
Wenyuan Xu
Current Events: Identifying Webpages by Tapping the Electrical Outlet.
ESORICS
(2013)
Jin Li
,
Xiaofeng Chen
,
Jingwei Li
,
Chunfu Jia
,
Jianfeng Ma
,
Wenjing Lou
Fine-Grained Access Control System Based on Outsourced Attribute-Based Encryption.
ESORICS
(2013)
Bruno Conchinha
,
David A. Basin
,
Carlos Caleiro
Symbolic Probabilistic Analysis of Off-Line Guessing.
ESORICS
(2013)
Ben Smyth
,
David Bernhard
Ballot Secrecy and Ballot Independence Coincide.
ESORICS
(2013)
Özgür Dagdelen
,
Marc Fischlin
,
Tommaso Gagliardoni
,
Giorgia Azzurra Marson
,
Arno Mittelbach
,
Cristina Onete
A Cryptographic Analysis of OPACITY - (Extended Abstract).
ESORICS
(2013)
Deian Stefan
,
Pablo Buiras
,
Edward Z. Yang
,
Amit Levy
,
David Terei
,
Alejandro Russo
,
David Mazières
Eliminating Cache-Based Timing Attacks with Instruction-Based Scheduling.
ESORICS
(2013)
Andreas Griesmayer
,
Charles Morisset
Automated Certification of Authorisation Policy Resistance.
ESORICS
(2013)
Arjan Jeckmans
,
Andreas Peter
,
Pieter H. Hartel
Efficient Privacy-Enhanced Familiarity-Based Recommender System.
ESORICS
(2013)
Yossi Gilad
,
Amir Herzberg
Plug-and-Play IP Security - Anonymity Infrastructure instead of PKI.
ESORICS
(2013)
Zhui Deng
,
Xiangyu Zhang
,
Dongyan Xu
BISTRO: Binary Component Extraction and Embedding for Software Security Applications.
ESORICS
(2013)
Max I. Kanovich
,
Tajana Ban Kirigin
,
Vivek Nigam
,
Andre Scedrov
Bounded Memory Protocols and Progressing Collaborative Systems.
ESORICS
(2013)
Benjamin S. Lerner
,
Liam Elberty
,
Neal Poole
,
Shriram Krishnamurthi
Verifying Web Browser Extensions' Compliance with Private-Browsing Mode.
ESORICS
(2013)
Ivan Damgård
,
Marcel Keller
,
Enrique Larraia
,
Valerio Pastro
,
Peter Scholl
,
Nigel P. Smart
Practical Covertly Secure MPC for Dishonest Majority - Or: Breaking the SPDZ Limits.
ESORICS
(2013)
Jafar Haadi Jafarian
,
Ehab Al-Shaer
,
Qi Duan
Formal Approach for Route Agility against Persistent Attackers.
ESORICS
(2013)
Michael Backes
,
Dario Fiore
,
Esfandiar Mohammadi
Privacy-Preserving Accountable Computation.
ESORICS
(2013)
Dmitry Kononchuk
,
Zekeriya Erkin
,
Jan C. A. van der Lubbe
,
Reginald L. Lagendijk
Privacy-Preserving User Data Oriented Services for Groups with Dynamic Participation.
ESORICS
(2013)
Sabrina De Capitani di Vimercati
,
Sara Foresti
,
Stefano Paraboschi
,
Gerardo Pelosi
,
Pierangela Samarati
Distributed Shuffling for Preserving Access Confidentiality.
ESORICS
(2013)
volume 8134, 2013
Computer Security - ESORICS 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings
ESORICS
8134 (2013)
2012
Alex Biryukov
,
Ivan Pustogarov
,
Ralf-Philipp Weinmann
TorScan: Tracing Long-Lived Connections and Differential Scanning Attacks.
ESORICS
(2012)
Mengtao Sun
,
Gang Tan
JVM-Portable Sandboxing of Java's Native Libraries.
ESORICS
(2012)
Aanjhan Ranganathan
,
Nils Ole Tippenhauer
,
Boris Skoric
,
Dave Singelée
,
Srdjan Capkun
Design and Implementation of a Terrorist Fraud Resilient Distance Bounding System.
ESORICS
(2012)
Simon Eberz
,
Martin Strohmeier
,
Matthias Wilhelm
,
Ivan Martinovic
A Practical Man-In-The-Middle Attack on Signal-Based Key Generation Protocols.
ESORICS
(2012)
Flavio D. Garcia
,
Gerhard de Koning Gans
,
Roel Verdult
,
Milosch Meriac
Dismantling iClass and iClass Elite.
ESORICS
(2012)
volume 7459, 2012
Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings
ESORICS
7459 (2012)