


default search action
19th ESORICS 2014: Wroclaw, Poland
- Miroslaw Kutylowski, Jaideep Vaidya:

Computer Security - ESORICS 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part II. Lecture Notes in Computer Science 8713, Springer 2014, ISBN 978-3-319-11211-4 - Kwangsu Lee

, Woo Kwon Koo, Dong Hoon Lee, Jong Hwan Park:
Public-Key Revocation and Tracing Schemes with Subset Difference Methods Revisited. 1-18 - Jean-Philippe Aumasson, Philipp Jovanovic, Samuel Neves

:
NORX: Parallel and Scalable AEAD. 19-36 - Giorgia Azzurra Marson, Bertram Poettering:

Even More Practical Secure Logging: Tree-Based Seekable Sequential Key Generators. 37-54 - Jianting Ning, Zhenfu Cao

, Xiaolei Dong, Lifei Wei, Xiaodong Lin:
Large Universe Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability. 55-72 - Jinguang Han

, Willy Susilo
, Yi Mu, Jianying Zhou
, Man Ho Au
:
PPDCP-ABE: Privacy-Preserving Decentralized Ciphertext-Policy Attribute-Based Encryption. 73-90 - Weiran Liu, Jianwei Liu

, Qianhong Wu, Bo Qin, Yunya Zhou:
Practical Direct Chosen Ciphertext Secure Key-Policy Attribute-Based Encryption with Public Ciphertext Test. 91-108 - Jan Camenisch, Anja Lehmann, Gregory Neven, Alfredo Rial:

Privacy-Preserving Auditing for Attribute-Based Credentials. 109-127 - Igor Bilogrevic, Julien Freudiger, Emiliano De Cristofaro, Ersin Uzun

:
What's the Gist? Privacy-Preserving Aggregation of User Profiles. 128-145 - Raghavendran Balu, Teddy Furon, Sébastien Gambs:

Challenging Differential Privacy: The Case of Non-interactive Mechanisms. 146-164 - Joachim Biskup, Piero A. Bonatti

, Clemente Galdi
, Luigi Sauro:
Optimality and Complexity of Inference-Proof Data Filtering and CQE. 165-181 - Joseph K. Liu

, Man Ho Au
, Xinyi Huang, Willy Susilo
, Jianying Zhou
, Yong Yu
:
New Insight to Preserve Online Survey Accuracy and Privacy in Big Data Era. 182-199 - Jean-François Lalande

, Karine Heydemann, Pascal Berthomé:
Software Countermeasures for Control Flow Integrity of Smart Card C Codes. 200-218 - Tom Chothia, Yusuke Kawamoto

, Chris Novakovic
:
LeakWatch: Estimating Information Leakage from Java Programs. 219-236 - David I. Urbina, Yufei Gu, Juan Caballero, Zhiqiang Lin:

SigPath: A Memory Graph Based Approach for Program Data Introspection and Modification. 237-256 - Xun Yi, Feng Hao

, Elisa Bertino:
ID-Based Two-Server Password-Authenticated Key Exchange. 257-276 - Jörg Schwenk:

Modelling Time for Authenticated Key Exchange Protocols. 277-294 - Franziskus Kiefer

, Mark Manulis
:
Zero-Knowledge Password Policy Checks and Verifier-Based PAKE. 295-312 - Christian Decker

, Roger Wattenhofer:
Bitcoin Transaction Malleability and MtGox. 313-326 - Véronique Cortier, David Galindo

, Stéphane Glondu, Malika Izabachène:
Election Verifiability for Helios under Weaker Trust Assumptions. 327-344 - Tim Ruffing

, Pedro Moreno-Sanchez
, Aniket Kate:
CoinShuffle: Practical Decentralized Coin Mixing for Bitcoin. 345-364 - John Sonchack, Adam J. Aviv

:
LESS Is More: Host-Agent Based Simulator for Large-Scale Evaluation of Security Systems. 365-382 - Christopher S. Gates, Ninghui Li, Zenglin Xu, Suresh N. Chari, Ian M. Molloy, Youngja Park:

Detecting Insider Information Theft Using Features from File Access Logs. 383-400 - Yong Wang, Zhaoyan Xu, Jialong Zhang, Lei Xu, Haopei Wang, Guofei Gu:

SRID: State Relation Based Intrusion Detection for False Data Injection Attacks in SCADA. 401-418 - Haitao Xu, Daiping Liu, Aaron Koehl, Haining Wang, Angelos Stavrou

:
Click Fraud Detection on the Advertiser Side. 419-438 - Shishir Nagaraja:

Botyacc: Unified P2P Botnet Detection Using Behavioural Analysis and Graph Analysis. 439-456 - Byungho Min, Vijay Varadharajan

:
Feature-Distributed Malware Attack: Risk and Defence. 457-474 - Lingchen Zhang, Sachin Shetty

, Peng Liu, Jiwu Jing:
RootkitDet: Practical End-to-End Defense against Kernel Rootkits in a Cloud Environment. 475-493 - Lingyu Wang, Mengyuan Zhang

, Sushil Jajodia
, Anoop Singhal, Massimiliano Albanese
:
Modeling Network Diversity for Evaluating the Robustness of Networks against Zero-Day Attacks. 494-511

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














