


default search action
20th ESORICS 2015: Vienna, Austria
- Günther Pernul, Peter Y. A. Ryan

, Edgar R. Weippl:
Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part II. Lecture Notes in Computer Science 9327, Springer 2015, ISBN 978-3-319-24176-0
Privacy
- Christof Ferreira Torres

, Hugo L. Jonker
, Sjouke Mauw:
FP-Block: Usable Web Privacy by Controlling Browser Fingerprinting. 3-19 - Wenrui Diao

, Xiangyu Liu, Zhe Zhou, Kehuan Zhang, Zhou Li:
Mind-Reading: Privacy Attacks Exploiting Cross-App KeyEvent Injections. 20-39 - Xingliang Yuan

, Helei Cui
, Xinyu Wang
, Cong Wang
:
Enabling Privacy-Assured Similarity Retrieval over Millions of Encrypted Records. 40-60 - Yao Zheng

, Bing Wang, Wenjing Lou, Yiwei Thomas Hou
:
Privacy-Preserving Link Prediction in Decentralized Online Social Networks. 61-80 - Florian Kerschbaum, Hoon Wei Lim:

Privacy-Preserving Observation in Public Spaces. 81-100 - Qiang Tang, Jun Wang:

Privacy-Preserving Context-Aware Recommender Systems: Analysis and New Solutions. 101-119
Cloud Security
- Sky Faber, Stanislaw Jarecki, Hugo Krawczyk, Quan Nguyen, Marcel-Catalin Rosu, Michael Steiner:

Rich Queries on Encrypted Data: Beyond Exact Matches. 123-145 - Yanjiang Yang, Joseph K. Liu, Kaitai Liang

, Kim-Kwang Raymond Choo
, Jianying Zhou
:
Extended Proxy-Assisted Approach: Achieving Revocable Fine-Grained Encryption of Cloud Data. 146-166 - Liang Feng Zhang, Reihaneh Safavi-Naini:

Batch Verifiable Computation of Polynomials on Outsourced Data. 167-185 - Qian Wang

, Shengshan Hu
, Kui Ren
, Meiqi He, Minxin Du
, Zhibo Wang:
CloudBI: Practical Privacy-Preserving Outsourcing of Biometric Identification in the Cloud. 186-205
Protocols and Attribute-Based Encryption
- Omar Almousa

, Sebastian Mödersheim
, Paolo Modesti
, Luca Viganò
:
Typing and Compositionality for Security Protocols: A Generalization to the Geometric Fragment. 209-229 - Rémy Chrétien, Véronique Cortier, Stéphanie Delaune:

Checking Trace Equivalence: How to Get Rid of Nonces? 230-251 - Tran Viet Xuan Phuong, Guomin Yang

, Willy Susilo
, Xiaofeng Chen:
Attribute Based Broadcast Encryption with Short Ciphertext and Decryption Key. 252-269 - Jianting Ning, Xiaolei Dong, Zhenfu Cao

, Lifei Wei:
Accountable Authority Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability and Public Auditing in the Cloud. 270-289
Code Analysis and Side-Channels
- Yueqian Zhang, Xiapu Luo

, Haoyang Yin:
DexHunter: Toward Extracting Hidden Code from Packed Android Applications. 293-311 - Hong Hu, Zheng Leong Chua, Zhenkai Liang

, Prateek Saxena:
Identifying Arbitrary Memory Access Vulnerabilities in Privilege-Separated Software. 312-331 - Wei Wang, Jingqiang Lin, Zhan Wang, Ze Wang, Luning Xia:

vBox: Proactively Establishing Secure Channels Between Wireless Devices Without Prior Knowledge. 332-351
Detection and Monitoring
- Sufatrio, Tong-Wei Chua, Darell J. J. Tan, Vrizlynn L. L. Thing:

Accurate Specification for Robust Detection of Malicious Behavior in Mobile Environments. 355-375 - Maximilian Seitzer, Michael Gruhn, Tilo Müller:

A Bytecode Interpreter for Secure Program Execution in Untrusted Main Memory. 376-395 - Youngja Park, Ian M. Molloy, Suresh N. Chari, Zenglin Xu, Christopher S. Gates, Ninghui Li:

Learning from Others: User Anomaly Detection Using Anomalous Samples from Other Users. 396-414
Authentication
- Jingyu Hua, Shaoyong Du

, Sheng Zhong:
Towards Attack-Resistant Peer-Assisted Indoor Localization. 417-437 - Mahdi Nasrullah Al-Ameen, Kanis Fatema, Matthew K. Wright

, Shannon Scielzo
:
Leveraging Real-Life Facts to Make Random Passwords More Memorable. 438-455 - Ding Wang

, Ping Wang:
The Emperor's New Password Creation Policies: An Evaluation of Leading Web Services and the Effect of Role in Resisting Against Online Guessing. 456-477
Policies
- Donald Ray, Jay Ligatti:

A Theory of Gray Security Policies. 481-499 - Ximeng Li, Flemming Nielson

, Hanne Riis Nielson
:
Factorization of Behavioral Integrity. 500-519 - Kristopher K. Micinski, Jonathan Fetter-Degges, Jinseong Jeon, Jeffrey S. Foster, Michael R. Clarkson:

Checking Interaction-Based Declassification Policies for Android Using Symbolic Execution. 520-538
Applied Security
- Raja Naeem Akram

, Konstantinos Markantonakis
, Keith Mayes:
Enhancing Java Runtime Environment for Smart Cards Against Runtime Attacks. 541-560 - Christian Decker

, James Guthrie, Jochen Seidel, Roger Wattenhofer:
Making Bitcoin Exchanges Transparent. 561-576 - Behnaz Hassanshahi, Yaoqi Jia, Roland H. C. Yap, Prateek Saxena, Zhenkai Liang

:
Web-to-Application Injection Attacks on Android: Characterization and Detection. 577-598 - Dibya Mukhopadhyay, Maliheh Shirvanian, Nitesh Saxena:

All Your Voices are Belong to Us: Stealing Voices to Fool Humans and Machines. 599-621 - Tobias Pulls, Roel Peeters

:
Balloon: A Forward-Secure Append-Only Persistent Authenticated Data Structure. 622-641 - Léa El Samarji, Nora Cuppens-Boulahia, Frédéric Cuppens, Serge Papillon, Waël Kanoun, Samuel Dubus:

On the Fly Design and Co-simulation of Responses Against Simultaneous Attacks. 642-661

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














