Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Bruno Conchinha, David A. Basin, Carlos Caleiro |
Symbolic Probabilistic Analysis of Off-Line Guessing. |
ESORICS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Phani Vadrevu, Babak Rahbarinia, Roberto Perdisci, Kang Li 0001, Manos Antonakakis |
Measuring and Detecting Malware Downloads in Live Network Traffic. |
ESORICS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Devdatta Akhawe, Frank Li 0001, Warren He, Prateek Saxena, Dawn Song |
Data-Confined HTML5 Applications. |
ESORICS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Giorgia Azzurra Marson, Bertram Poettering |
Practical Secure Logging: Seekable Sequential Key Generators. |
ESORICS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Andreas Griesmayer, Charles Morisset |
Automated Certification of Authorisation Policy Resistance. |
ESORICS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jin Li 0002, Xiaofeng Chen 0001, Jingwei Li 0001, Chunfu Jia, Jianfeng Ma 0001, Wenjing Lou |
Fine-Grained Access Control System Based on Outsourced Attribute-Based Encryption. |
ESORICS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Ben Smyth, David Bernhard |
Ballot Secrecy and Ballot Independence Coincide. |
ESORICS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Deian Stefan, Pablo Buiras, Edward Z. Yang, Amit Levy, David Terei, Alejandro Russo, David Mazières |
Eliminating Cache-Based Timing Attacks with Instruction-Based Scheduling. |
ESORICS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Limin Jia 0001, Jassim Aljuraidan, Elli Fragkaki, Lujo Bauer, Michael Stroucken, Kazuhide Fukushima, Shinsaku Kiyomoto, Yutaka Miyake |
Run-Time Enforcement of Information-Flow Properties on Android - (Extended Abstract). |
ESORICS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jonathan Crussell, Clint Gibler, Hao Chen 0003 |
AnDarwin: Scalable Detection of Semantically Similar Android Applications. |
ESORICS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Aron Laszka, Benjamin Johnson 0001, Pascal Schöttle, Jens Grossklags, Rainer Böhme |
Managing the Weakest Link - A Game-Theoretic Approach for the Mitigation of Insider Threats. |
ESORICS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jun Dai, Xiaoyan Sun 0003, Peng Liu 0005 |
Patrol: Revealing Zero-Day Attack Paths through Network-Wide System Object Dependencies. |
ESORICS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Youngja Park, Christopher S. Gates, Stephen C. Gates |
Estimating Asset Sensitivity by Profiling Users. |
ESORICS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Edouard Cuvelier, Olivier Pereira, Thomas Peters |
Election Verifiability or Ballot Privacy: Do We Need to Choose? |
ESORICS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Mathias Humbert, Théophile Studer, Matthias Grossglauser, Jean-Pierre Hubaux |
Nowhere to Hide: Navigating around Privacy in Online Social Networks. |
ESORICS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Zhui Deng, Xiangyu Zhang 0001, Dongyan Xu |
BISTRO: Binary Component Extraction and Embedding for Software Security Applications. |
ESORICS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Steve Kremer, Robert Künnemann, Graham Steel |
Universally Composable Key-Management. |
ESORICS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Marco Valerio Barbera, Vasileios P. Kemerlis, Vasilis Pappas, Angelos D. Keromytis |
CellFlood: Attacking Tor Onion Routers on the Cheap. |
ESORICS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Gerardo Pelosi, Pierangela Samarati |
Distributed Shuffling for Preserving Access Confidentiality. |
ESORICS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Yossef Oren, Dvir Schirman, Avishai Wool |
Range Extension Attacks on Contactless Smart Cards. |
ESORICS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jun Furukawa 0001 |
Request-Based Comparable Encryption. |
ESORICS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jinpeng Wei, Feng Zhu 0015, Calton Pu |
KQguard: Binary-Centric Defense against Kernel Queue Injection Attacks. |
ESORICS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Martin Gagné, Pascal Lafourcade 0001, Yassine Lakhnech |
Automated Security Proofs for Almost-Universal Hash for MAC Verification. |
ESORICS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Özgür Dagdelen, Marc Fischlin, Tommaso Gagliardoni, Giorgia Azzurra Marson, Arno Mittelbach, Cristina Onete |
A Cryptographic Analysis of OPACITY - (Extended Abstract). |
ESORICS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Dan Caselden, Alex Bazhanyuk, Mathias Payer, Stephen McCamant, Dawn Song |
HI-CFG: Construction by Binary Analysis and Application to Attack Polymorphism. |
ESORICS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Dmitry Kononchuk, Zekeriya Erkin, Jan C. A. van der Lubbe, Reginald L. Lagendijk |
Privacy-Preserving User Data Oriented Services for Groups with Dynamic Participation. |
ESORICS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Mishari Al Mishari, Paolo Gasti, Gene Tsudik, Ekin Oguz |
Privacy-Preserving Matching of Community-Contributed Content. |
ESORICS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jan Camenisch, Robert R. Enderlein, Victor Shoup |
Practical and Employable Protocols for UC-Secure Circuit Evaluation over ℤn. |
ESORICS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jason Crampton, Sushil Jajodia, Keith Mayes (eds.) |
Computer Security - ESORICS 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings |
ESORICS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jafar Haadi Jafarian, Ehab Al-Shaer, Qi Duan |
Formal Approach for Route Agility against Persistent Attackers. |
ESORICS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Hugo Daniel Macedo, Tayssir Touili |
Mining Malware Specifications through Static Reachability Analysis. |
ESORICS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Michael Backes 0001, Dario Fiore 0001, Esfandiar Mohammadi |
Privacy-Preserving Accountable Computation. |
ESORICS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Xinshu Dong, Hong Hu 0004, Prateek Saxena, Zhenkai Liang |
A Quantitative Evaluation of Privilege Separation in Web Browser Designs. |
ESORICS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Lei Wei 0004, Michael K. Reiter |
Ensuring File Authenticity in Private DFA Evaluation on Encrypted Files in the Cloud. |
ESORICS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Benjamin S. Lerner, Liam Elberty, Neal Poole, Shriram Krishnamurthi |
Verifying Web Browser Extensions' Compliance with Private-Browsing Mode. |
ESORICS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Ivan Damgård, Marcel Keller, Enrique Larraia, Valerio Pastro, Peter Scholl, Nigel P. Smart |
Practical Covertly Secure MPC for Dishonest Majority - Or: Breaking the SPDZ Limits. |
ESORICS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Amir Herzberg, Haya Schulmann |
Vulnerable Delegation of DNS Resolution. |
ESORICS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Naipeng Dong, Hugo Jonker, Jun Pang 0001 |
Enforcing Privacy in the Presence of Others: Notions, Formalisations and Relations. |
ESORICS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Arjan Jeckmans, Andreas Peter, Pieter H. Hartel |
Efficient Privacy-Enhanced Familiarity-Based Recommender System. |
ESORICS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Yossi Gilad, Amir Herzberg |
Plug-and-Play IP Security - Anonymity Infrastructure instead of PKI. |
ESORICS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Max I. Kanovich, Tajana Ban Kirigin, Vivek Nigam, Andre Scedrov |
Bounded Memory Protocols and Progressing Collaborative Systems. |
ESORICS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Michael Carl Tschantz, Anupam Datta, Jeannette M. Wing |
Purpose Restrictions on Information Use. |
ESORICS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Colin Boyd, Cas Cremers, Michèle Feltz, Kenneth G. Paterson, Bertram Poettering, Douglas Stebila |
ASICS: Authenticated Key Exchange Security Incorporating Certification Systems. |
ESORICS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Shane S. Clark, Hossen Asiful Mustafa, Benjamin Ransford, Jacob Sorber, Kevin Fu, Wenyuan Xu 0001 |
Current Events: Identifying Webpages by Tapping the Electrical Outlet. |
ESORICS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Arnar Birgisson, Daniel Hedin, Andrei Sabelfeld |
Boosting the Permissiveness of Dynamic Information-Flow Tracking by Testing. |
ESORICS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Jinkyu Koo, Xiaojun Lin 0001, Saurabh Bagchi |
PRIVATUS: Wallet-Friendly Privacy Protection for Smart Meters. |
ESORICS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Henning Schnoor |
Deciding Epistemic and Strategic Properties of Cryptographic Protocols. |
ESORICS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Aanjhan Ranganathan, Nils Ole Tippenhauer, Boris Skoric, Dave Singelée, Srdjan Capkun |
Design and Implementation of a Terrorist Fraud Resilient Distance Bounding System. |
ESORICS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Flavio D. Garcia, Gerhard de Koning Gans, Roel Verdult, Milosch Meriac |
Dismantling iClass and iClass Elite. |
ESORICS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Mishari Al Mishari, Gene Tsudik |
Exploring Linkability of User Reviews. |
ESORICS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Alex Biryukov, Ivan Pustogarov, Ralf-Philipp Weinmann |
TorScan: Tracing Long-Lived Connections and Differential Scanning Attacks. |
ESORICS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Ruben Rios, Jorge Cuéllar, Javier López 0001 |
Robust Probabilistic Fake Packet Injection for Receiver-Location Privacy in WSN. |
ESORICS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Naipeng Dong, Hugo Jonker, Jun Pang 0001 |
Formal Analysis of Privacy in an eHealth Protocol. |
ESORICS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Serdar Erbatur, Santiago Escobar 0001, Deepak Kapur, Zhiqiang Liu, Christopher Lynch, Catherine Meadows 0001, José Meseguer 0001, Paliath Narendran, Sonia Santiago, Ralf Sasse |
Effective Symbolic Protocol Analysis via Equational Irreducibility Conditions. |
ESORICS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Yvo Desmedt, Pyrros Chaidos |
Applying Divertibility to Blind Ballot Copying in the Helios Internet Voting System. |
ESORICS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Jannik Dreier, Pascal Lafourcade 0001, Yassine Lakhnech |
Defining Privacy for Weighted Votes, Single and Multi-voter Coercion. |
ESORICS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Simon Eberz, Martin Strohmeier, Matthias Wilhelm 0001, Ivan Martinovic |
A Practical Man-In-The-Middle Attack on Signal-Based Key Generation Protocols. |
ESORICS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Markus Dürmuth, Tim Güneysu, Markus Kasper, Christof Paar, Tolga Yalçin, Ralf Zimmermann 0001 |
Evaluation of Standardized Password-Based Key Derivation against Parallel Processing Platforms. |
ESORICS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Naveed Ahmed 0005, Christian Damsgaard Jensen, Erik Zenner |
Towards Symbolic Encryption Schemes. |
ESORICS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Daisuke Moriyama, Shin'ichiro Matsuo, Miyako Ohkubo |
Relations among Notions of Privacy for RFID Authentication Protocols. |
ESORICS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Marina Blanton, Mikhail J. Atallah, Keith B. Frikken, Qutaibah M. Malluhi |
Secure and Efficient Outsourcing of Sequence Comparisons. |
ESORICS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Yongzheng Wu, Sai Sathyanarayan, Roland H. C. Yap, Zhenkai Liang |
Codejail: Application-Transparent Isolation of Libraries with Tight Program Interactions. |
ESORICS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | James Kelley, Roberto Tamassia, Nikos Triandopoulos |
Hardening Access Control and Data Protection in GFS-like File Systems. |
ESORICS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Kin Ying Yu, Tsz Hon Yuen, Sherman S. M. Chow, Siu-Ming Yiu, Lucas Chi Kwong Hui |
PE(AR)2: Privacy-Enhanced Anonymous Authentication with Reputation and Revocation. |
ESORICS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Arif Akram Khan, Philip W. L. Fong |
Satisfiability and Feasibility in a Relationship-Based Workflow Authorization Model. |
ESORICS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Tzipora Halevi, Di Ma, Nitesh Saxena, Tuo Xiang |
Secure Proximity Detection for NFC Devices Based on Ambient Sensor Data. |
ESORICS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Mengtao Sun, Gang Tan |
JVM-Portable Sandboxing of Java's Native Libraries. |
ESORICS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Elli Fragkaki, Lujo Bauer, Limin Jia 0001, David Swasey |
Modeling and Enhancing Android's Permission System. |
ESORICS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Adam J. Aviv, Micah Sherr, Matt Blaze, Jonathan M. Smith |
Privacy-Aware Message Exchanges for Geographically Routed Human Movement Networks. |
ESORICS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Xiaofeng Chen 0001, Jin Li 0002, Jianfeng Ma 0001, Qiang Tang 0001, Wenjing Lou |
New Algorithms for Secure Outsourcing of Modular Exponentiations. |
ESORICS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Philippe Beaucamps, Isabelle Gnaedig, Jean-Yves Marion |
Abstraction-Based Malware Analysis Using Rewriting and Model Checking. |
ESORICS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Qijun Gu, Kyle Jones, Wanyu Zang, Meng Yu 0001, Peng Liu 0005 |
Revealing Abuses of Channel Assignment Protocols in Multi-channel Wireless Networks: An Investigation Logic Approach. |
ESORICS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Yao Zheng, Ming Li 0003, Wenjing Lou, Y. Thomas Hou 0001 |
SHARP: Private Proximity Test and Secure Handshake with Cheat-Proof Location Tags. |
ESORICS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Ziming Zhao 0001, Gail-Joon Ahn, Hongxin Hu, Deepinder Mahi |
SocialImpact: Systematic Analysis of Underground Social Dynamics. |
ESORICS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Ahmad-Reza Sadeghi, Steffen Schulz 0001, Vijay Varadharajan |
The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNs. |
ESORICS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Tibor Jager, Sebastian Schinzel, Juraj Somorovsky |
Bleichenbacher's Attack Strikes again: Breaking PKCS#1 v1.5 in XML Encryption. |
ESORICS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Italo Dacosta, Mustaque Ahamad, Patrick Traynor |
Trust No One Else: Detecting MITM Attacks against SSL/TLS without Third-Parties. |
ESORICS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Amir Herzberg, Haya Schulmann |
Security of Patched DNS. |
ESORICS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Fuchun Guo, Yi Mu 0001, Willy Susilo |
Identity-Based Traitor Tracing with Short Private Key and Short Ciphertext. |
ESORICS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Rakesh M. Verma, Narasimha K. Shashidhar, Nabil Hossain |
Detecting Phishing Emails the Natural Language Way. |
ESORICS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Lei Wei 0004, Michael K. Reiter |
Third-Party Private DFA Evaluation on Encrypted Files in the Cloud. |
ESORICS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Cas Cremers, Michèle Feltz |
Beyond eCK: Perfect Forward Secrecy under Actor Compromise and Ephemeral-Key Reveal. |
ESORICS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Jack W. Stokes, John C. Platt, Helen J. Wang, Joe Faulhaber, Jonathan Keller, Mady Marinescu, Anil Thomas, Marius Gheorghescu |
Scalable Telemetry Classification for Automated Malware Detection. |
ESORICS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Karl-Peter Fuchs, Dominik Herrmann, Hannes Federrath |
Introducing the gMix Open Source Framework for Mix Implementations. |
ESORICS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Jonathan Crussell, Clint Gibler, Hao Chen 0003 |
Attack of the Clones: Detecting Cloned Applications on Android Markets. |
ESORICS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Joseph K. Liu, Man Ho Au, Willy Susilo, Jianying Zhou 0001 |
Enhancing Location Privacy for Electric Vehicles (at the Right time). |
ESORICS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Sara Foresti, Moti Yung, Fabio Martinelli (eds.) |
Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings |
ESORICS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Massimiliano Albanese, Alessandra De Benedictis, Sushil Jajodia, Paulo Shakarian |
A Probabilistic Framework for Localization of Attackers in MANETs. |
ESORICS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Paolo Gasti, Kasper Bonne Rasmussen |
On the Security of Password Manager Database Formats. |
ESORICS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Charanjit S. Jutla, Arnab Roy 0001 |
Decision Procedures for Simulatability. |
ESORICS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Deepak D'Souza, K. R. Raghavendra |
Model-Checking Bisimulation-Based Information Flow Properties for Infinite State Systems. |
ESORICS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Sebastian Mödersheim |
Deciding Security for a Fragment of ASLan. |
ESORICS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Matthew K. Franklin, Haibin Zhang |
Unique Group Signatures. |
ESORICS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Ralph Holz, Thomas Riedmaier, Nils Kammenhuber, Georg Carle |
X.509 Forensics: Detecting and Localising the SSL/TLS Men-in-the-Middle. |
ESORICS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | David Galindo, Javier Herranz, Jorge L. Villar |
Identity-Based Encryption with Master Key-Dependent Message Security and Leakage-Resilience. |
ESORICS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Xiao-yong Zhou, Bo Peng, Yong Fuga Li, Yangyi Chen, Haixu Tang, XiaoFeng Wang 0001 |
To Release or Not to Release: Evaluating Information Leaks in Aggregate Human-Genome Data. |
ESORICS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Sören Bleikertz, Thomas Groß 0001, Matthias Schunter, Konrad Eriksson |
Automated Information Flow Analysis of Virtualized Infrastructures. |
ESORICS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Gunnar Kreitz |
Timing Is Everything: The Importance of History Detection. |
ESORICS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Vijay Atluri, Claudia Díaz (eds.) |
Computer Security - ESORICS 2011 - 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings |
ESORICS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Zhen Liu 0008, Zhenfu Cao, Qiong Huang 0001, Duncan S. Wong, Tsz Hon Yuen |
Fully Secure Multi-authority Ciphertext-Policy Attribute-Based Encryption without Random Oracles. |
ESORICS |
2011 |
DBLP DOI BibTeX RDF |
|