Login / Signup
ESORICS Workshops (1)
2024
2024
2024
Keyphrases
Publications
volume 14398, 2024
Computer Security. ESORICS 2023 International Workshops - CyberICS, DPM, CBT, and SECPRE, The Hague, The Netherlands, September 25-29, 2023, Revised Selected Papers, Part I
ESORICS Workshops (1)
14398 (2024)
2023
Lennart Bader
,
Eric Wagner
,
Martin Henze
,
Martin Serror
METRICS: A Methodology for Evaluating and Testing the Resilience of Industrial Control Systems to Cyberattacks.
ESORICS Workshops (1)
(2023)
Amir Zarei
,
Staal Amund Vinterbo
Secure Multiparty Sampling of a Biased Coin for Differential Privacy.
ESORICS Workshops (1)
(2023)
Konstantinos Kontogeorgopoulos
,
Kyriakos Kritikos
Overview of Social Engineering Protection and Prevention Methods.
ESORICS Workshops (1)
(2023)
Jens Leicht
,
Marvin Wagner
,
Maritta Heisel
Creating Privacy Policies from Data-Flow Diagrams.
ESORICS Workshops (1)
(2023)
Susanne Barkhald Sandberg
,
Aida Akbarzadeh
,
Vasileios Gkioulos
Effects of Organizational Cyber Security Culture Across the Energy Sector Supply Chain.
ESORICS Workshops (1)
(2023)
Charmaine Ndolo
,
Florian Tschorsch
On the (Not So) Surprising Impact of Multi-Path Payments on Performance And Privacy in the Lightning Network.
ESORICS Workshops (1)
(2023)
Sargam Gupta
,
Vicenç Torra
Differentially Private Traffic Flow Prediction Using Transformers: A Federated Approach.
ESORICS Workshops (1)
(2023)
Stavros Simou
,
Aikaterini-Georgia Mavroeidi
,
Christos Kalloniatis
Review on Privacy and Trust Methodologies in Cloud Computing.
ESORICS Workshops (1)
(2023)
Carolin Brunn
,
Saskia Nuñez von Voigt
,
Florian Tschorsch
-Anonymization for Smart Meter Data.
ESORICS Workshops (1)
(2023)
Bahareh Parhizkari
,
Antonio Ken Iannillo
,
Christof Ferreira Torres
,
Sebastian Banescu
,
Joseph Jiaqi Xu
,
Radu State
Timely Identification of Victim Addresses in DeFi Attacks.
ESORICS Workshops (1)
(2023)
Francesco D'Amato
,
Luca Zanolini
A Simple Single Slot Finality Protocol for Ethereum.
ESORICS Workshops (1)
(2023)
Vincent Jacquot
,
Benoit Donnet
Chaussette: A Symbolic Verification of Bitcoin Scripts.
ESORICS Workshops (1)
(2023)
Mohammad Sadegh Nourbakhsh
,
Feng Hao
,
Arshad Jhumka
Transaction Fee Mechanism for Order-Sensitive Blockchain-Based Applications.
ESORICS Workshops (1)
(2023)
Bernard Asare
,
Paula Branco
,
Iluju Kiringa
,
Tet Hin Yeap
AddShare: A Privacy-Preserving Approach for Federated Learning.
ESORICS Workshops (1)
(2023)
Björn Leander
,
Aida Causevic
,
Hans Hansson
,
Tomas Lindström
Evaluation of an OPC UA-Based Access Control Enforcement Architecture.
ESORICS Workshops (1)
(2023)
Florent Guépin
,
Matthieu Meeus
,
Ana-Maria Cretu
,
Yves-Alexandre de Montjoye
Synthetic Is All You Need: Removing the Auxiliary Data Assumption for Membership Inference Attacks Against Synthetic Data.
ESORICS Workshops (1)
(2023)
Michela Iezzi
,
Carsten Maple
,
Andrea Leonetti
Towards Real-World Private Computations with Homomorphic Encryption: Current Solutions and Open Challenges.
ESORICS Workshops (1)
(2023)
Abdelrahman Ragab
,
Mohammad Mannan
,
Amr M. Youssef
Try On, Spied On?: Privacy Analysis of Virtual Try-On Websites and Android Apps.
ESORICS Workshops (1)
(2023)
Karl Jonatan Due Vatn
,
Georgios Kavallieratos
,
Sokratis K. Katsikas
Threat Analysis in Dairy Farming 4.0.
ESORICS Workshops (1)
(2023)
Cihan Eryonucu
,
Panos Papadimitratos
Security and Privacy for Mobile Crowdsensing: Improving User Relevance and Privacy.
ESORICS Workshops (1)
(2023)
Saloni Kwatra
,
Ayush K. Varshney
,
Vicenç Torra
Integrally Private Model Selection for Support Vector Machine.
ESORICS Workshops (1)
(2023)
Cristòfol Daudén-Esmel
,
Jordi Castellà-Roca
,
Alexandre Viejo
,
Eduard Josep Bel-Ribes
PrivacySmart: Automatic and Transparent Management of Privacy Policies.
ESORICS Workshops (1)
(2023)
Bruno Rodrigues
,
Ivone Amorim
,
Ivan Silva
,
Alexandra Mendes
Patient-Centric Health Data Sovereignty: An Approach Using Proxy Re-Encryption.
ESORICS Workshops (1)
(2023)
Teodor Sommestad
,
Henrik Karlzén
,
Hanna Kvist
,
Hanna Gustafsson
Skade - A Challenge Management System for Cyber Threat Hunting.
ESORICS Workshops (1)
(2023)
Mario Raciti
,
Giampaolo Bella
Up-to-Date Threat Modelling for Soft Privacy on Smart Cars.
ESORICS Workshops (1)
(2023)
Massimiliano Baldo
,
Tommaso Bianchi
,
Mauro Conti
,
Alessio Trevisan
,
Federico Turrin
HoneyEVSE: An Honeypot to Emulate Electric Vehicle Supply Equipments.
ESORICS Workshops (1)
(2023)
Thrasyvoulos Giannakopoulos
,
Konstantinos N. Maliatsos
On the Usage of NLP on CVE Descriptions for Calculating Risk.
ESORICS Workshops (1)
(2023)
Michal Choras
,
Aleksandra Pawlicka
,
Dagmara Jaroszewska-Choras
,
Marek Pawlicki
Not Only Security and Privacy: The Evolving Ethical and Legal Challenges of E-Commerce.
ESORICS Workshops (1)
(2023)
Vincent Happersberger
,
Frank-Walter Jäkel
,
Thomas Knothe
,
Yvonne-Anne Pignolet
,
Stefan Schmid
Comparison of Ethereum Smart Contract Analysis and Verification Methods.
ESORICS Workshops (1)
(2023)