Login / Signup
DPM/QASA@ESORICS
2016
2016
2016
Keyphrases
Publications
2016
Maarten van Wieren
,
Christian Doerr
,
Vivian Jacobs
,
Wolter Pieters
Understanding Bifurcation of Slow Versus Fast Cyber-Attackers.
DPM/QASA@ESORICS
(2016)
Florian Kammüller
Refactoring Preserves Security.
DPM/QASA@ESORICS
(2016)
Sourya Joyee De
,
Daniel Le Métayer
PRIAM: A Privacy Risk Analysis Methodology.
DPM/QASA@ESORICS
(2016)
Florian Kammüller
Isabelle Modelchecking for Insider Threats.
DPM/QASA@ESORICS
(2016)
Alexander Weigl
Efficient SAT-Based Pre-image Enumeration for Quantitative Information Flow in Programs.
DPM/QASA@ESORICS
(2016)
Ahmad Sabouri
On the User Acceptance of Privacy-Preserving Attribute-Based Credentials - A Qualitative Study.
DPM/QASA@ESORICS
(2016)
Peeter Laud
,
Alisa Pankova
Securing Multiparty Protocols Against the Exposure of Data to Honest Parties.
DPM/QASA@ESORICS
(2016)
Ilaria Matteucci
,
Francesco Santini
Decomposing Global Quantitative Properties into Local Ones.
DPM/QASA@ESORICS
(2016)
Yousra Javed
,
Mohamed Shehab
Investigating the Animation of Application Permission Dialogs: A Case Study of Facebook.
DPM/QASA@ESORICS
(2016)
Yang Liu
,
Andrew Simpson
Privacy-Preserving Targeted Mobile Advertising: Formal Models and Analysis.
DPM/QASA@ESORICS
(2016)
Hiroki Imabayashi
,
Yu Ishimaki
,
Akira Umayabara
,
Hiroki Sato
,
Hayato Yamana
Secure Frequent Pattern Mining by Fully Homomorphic Encryption with Ciphertext Packing.
DPM/QASA@ESORICS
(2016)
Dayana Spagnuelo
,
Cesare Bartolini
,
Gabriele Lenzini
Metrics for Transparency.
DPM/QASA@ESORICS
(2016)
Ghassane Amchyaa
,
Julien Bringer
,
Roch Lescuyer
Searchable Encryption for Biometric Identification Revisited.
DPM/QASA@ESORICS
(2016)
Joachim Biskup
,
Ralf Menzel
,
Jaouad Zarouali
Controlled Management of Confidentiality-Preserving Relational Interactions.
DPM/QASA@ESORICS
(2016)
Hiroaki Kikuchi
,
Takayasu Yamaguchi
,
Koki Hamada
,
Yuji Yamaoka
,
Hidenobu Oguri
,
Jun Sakuma
A Study from the Data Anonymization Competition Pwscup 2015.
DPM/QASA@ESORICS
(2016)
Álvaro García-Recuero
,
Jeffrey Burdges
,
Christian Grothoff
Privacy-Preserving Abuse Detection in Future Decentralised Online Social Networks.
DPM/QASA@ESORICS
(2016)
Martin Schanzenbach
,
Christian Banse
Managing and Presenting User Attributes over a Decentralized Secure Name System.
DPM/QASA@ESORICS
(2016)
volume 9963, 2016
Data Privacy Management and Security Assurance - 11th International Workshop, DPM 2016 and 5th International Workshop, QASA 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings
DPM/QASA@ESORICS
9963 (2016)
volume 9481, 2016
Data Privacy Management, and Security Assurance - 10th International Workshop, DPM 2015, and 4th International Workshop, QASA 2015, Vienna, Austria, September 21-22, 2015. Revised Selected Papers
DPM/QASA@ESORICS
9481 (2016)
2015
Kyriakos Kritikos
,
Philippe Massonet
Security-Based Adaptation of Multi-cloud Applications.
DPM/QASA@ESORICS
(2015)
Jesus Diaz
,
Seung Geol Choi
,
David Arroyo
,
Angelos D. Keromytis
,
Francisco de Borja Rodríguez
,
Moti Yung
Privacy Threats in E-Shopping (Position Paper).
DPM/QASA@ESORICS
(2015)
Sabrina De Capitani di Vimercati
,
Sara Foresti
,
Pierangela Samarati
Data Protection in Cloud Scenarios.
DPM/QASA@ESORICS
(2015)
Pasquale Puzio
,
Refik Molva
,
Melek Önen
,
Sergio Loureiro
PerfectDedup: Secure Data Deduplication.
DPM/QASA@ESORICS
(2015)
Ania M. Piotrowska
,
Marek Klonowski
Some Remarks and Ideas About Monetization of Sensitive Data.
DPM/QASA@ESORICS
(2015)
Carlos Parés-Pulido
,
Isaac Agudo
LockPic: Privacy Preserving Photo Sharing in Social Networks.
DPM/QASA@ESORICS
(2015)
Mohammed Alser
,
Nour Almadhoun
,
Azita Nouri
,
Can Alkan
,
Erman Ayday
Can you Really Anonymize the Donors of Genomic Data in Today's Digital World?
DPM/QASA@ESORICS
(2015)
Jan Henrik Ziegeldorf
,
Martin Henze
,
René Hummen
,
Klaus Wehrle
Comparison-Based Privacy: Nudging Privacy in Social Media (Position Paper).
DPM/QASA@ESORICS
(2015)
Cristian Tanas
,
Sergi Delgado-Segura
,
Jordi Herrera-Joancomartí
An Integrated Reward and Reputation Mechanism for MCS Preserving Users' Privacy.
DPM/QASA@ESORICS
(2015)
Steffen Helke
,
Florian Kammüller
,
Christian W. Probst
Secure Refactoring with Java Information Flow.
DPM/QASA@ESORICS
(2015)
Constantinos Patsakis
,
Jeroen van Rest
,
Michal Choras
,
Mélanie Bouroche
Privacy-Preserving Biometric Authentication and Matching via Lattice-Based Encryption.
DPM/QASA@ESORICS
(2015)
Olga Kieselmann
,
Nils Kopal
,
Arno Wacker
A Novel Approach to Data Revocation on the Internet.
DPM/QASA@ESORICS
(2015)
Megumi Ando
,
Joshua D. Guttman
Composable Bounds on Information Flow from Distribution Differences.
DPM/QASA@ESORICS
(2015)
Lukasz Olejnik
,
Gunes Acar
,
Claude Castelluccia
,
Claudia Díaz
The Leaking Battery - A Privacy Analysis of the HTML5 Battery Status API.
DPM/QASA@ESORICS
(2015)
Stephan Krenn
,
Kai Samelin
,
Dieter Sommer
Stronger Security for Sanitizable Signatures.
DPM/QASA@ESORICS
(2015)
Cristina Romero-Tris
,
David Megías
User-Centric Privacy-Preserving Collection and Analysis of Trajectory Data.
DPM/QASA@ESORICS
(2015)
Francesco Santini
,
Artsiom Yautsiukhin
Quantitative Analysis of Network Security with Abstract Argumentation.
DPM/QASA@ESORICS
(2015)
Murat Okkalioglu
,
Mehmet Koç
,
Huseyin Polat
On the Privacy of Horizontally Partitioned Binary Data-Based Privacy-Preserving Collaborative Filtering.
DPM/QASA@ESORICS
(2015)
Silvia Puglisi
,
David Rebollo-Monedero
,
Jordi Forné
You Never Surf Alone. Ubiquitous Tracking of Users' Browsing Habits.
DPM/QASA@ESORICS
(2015)
Avradip Mandal
,
Arnab Roy
,
Masaya Yasuda
Comprehensive and Improved Secure Biometric System Using Homomorphic Encryption.
DPM/QASA@ESORICS
(2015)
Christian Altmeier
,
Christian Mainka
,
Juraj Somorovsky
,
Jörg Schwenk
AdIDoS - Adaptive and Intelligent Fully-Automatic Detection of Denial-of-Service Weaknesses in Web Services.
DPM/QASA@ESORICS
(2015)