


default search action
21st ESORICS 2016: Heraklion, Greece
- Ioannis G. Askoxylakis, Sotiris Ioannidis, Sokratis K. Katsikas, Catherine Meadows:

Computer Security - ESORICS 2016 - 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part II. Lecture Notes in Computer Science 9879, Springer 2016, ISBN 978-3-319-45740-6
Leakage Management and Obfuscation
- Andreas Zankl

, Katja Miller, Johann Heyszl, Georg Sigl:
Towards Efficient Evaluation of a Time-Driven Cache Attack on Modern Processors. 3-19 - Michael T. Goodrich, Evgenios M. Kornaropoulos

, Michael Mitzenmacher, Roberto Tamassia
:
More Practical and Secure History-Independent Hash Tables. 20-38 - Brendan Sheridan, Micah Sherr:

On Manufacturing Resilient Opaque Constructs Against Static Analysis. 39-58
Secure Multiparty Computation
- Michel Abdalla

, Mario Cornejo, Anca Nitulescu, David Pointcheval
:
Robust Password-Protected Secret Sharing. 61-79 - Niklas Büscher, Andreas Holzer, Alina Weber, Stefan Katzenbeisser:

Compiling Low Depth Circuits for Practical Secure Computation. 80-98 - Xiao Wang

, S. Dov Gordon, Allen McIntosh, Jonathan Katz:
Secure Computation of MIPS Machine Code. 99-117
Secure Logging
- Roel Peeters

, Tobias Pulls:
Insynd: Improved Privacy-Preserving Transparency Logging. 121-139 - Benjamin Dowling, Felix Günther, Udyani Herath, Douglas Stebila

:
Secure Logging Schemes and Certificate Transparency. 140-158
Economics of Security
- Aron Laszka

, Mingyi Zhao, Jens Grossklags:
Banishing Misaligned Incentives for Validating Reports in Bug-Bounty Platforms. 161-178 - M. H. R. Khouzani, Pasquale Malacaria, Chris Hankin

, Andrew Fielder, Fabrizio Smeraldi:
Efficient Numerical Frameworks for Multi-objective Cyber Security Planning. 179-197
E-voting and E-commerce
- Ilias Giechaskiel

, Cas Cremers, Kasper Bonne Rasmussen:
On Bitcoin Security in the Presence of Broken Cryptographic Primitives. 201-222 - Siamak F. Shahandashti

, Feng Hao
:
DRE-ip: A Verifiable E-Voting Scheme Without Tallying Authorities. 223-240 - Myrto Arapinis, Véronique Cortier, Steve Kremer

:
When Are Three Voters Enough for Privacy Properties? 241-260 - Waclaw Banasik, Stefan Dziembowski, Daniel Malinowski:

Efficient Zero-Knowledge Contingent Payments in Cryptocurrencies Without Scripts. 261-280
Security of the Internet of Things
- Andreea-Ina Radu, Flavio D. Garcia:

LeiA: A Lightweight Authentication Protocol for CAN. 283-300 - David J. Wu, Ankur Taly, Asim Shankar, Dan Boneh:

Privacy, Discovery, and Authentication for the Internet of Things. 301-319 - Florian Kohnhäuser, Stefan Katzenbeisser:

Secure Code Updates for Mesh Networked Commodity Low-End Embedded Devices. 320-338 - Kim Thuat Nguyen, Nouha Oualha

, Maryline Laurent
:
Authenticated Key Agreement Mediated by a Proxy Re-encryptor for the Internet of Things. 339-358
Data Privacy
- Joachim Biskup, Marcel Preuß:

Information Control by Policy-Based Relational Weakening Templates. 361-381 - Arthur Gervais, Hubert Ritzdorf, Mario Lucic, Vincent Lenders

, Srdjan Capkun:
Quantifying Location Privacy Leakage from Transaction Prices. 382-405 - Valerie Fetzer, Jörn Müller-Quade, Tobias Nilges:

A Formal Treatment of Privacy in Video Data. 406-424
Security of Cyber-Physical Systems
- Marco Rocchetto, Nils Ole Tippenhauer

:
On Attacker Models and Profiles for Cyber-Physical Systems. 427-449 - Vivek Nigam, Carolyn L. Talcott, Abraão Aires Urquiza:

Towards the Automated Verification of Cyber-Physical Security Protocols: Bounding the Number of Timed Intruders. 450-470 - Cristina Alcaraz

, Javier López:
Safeguarding Structural Controllability in Cyber-Physical Control Systems. 471-489
Attacks
- Johanna Ullrich

, Edgar R. Weippl:
The Beauty or The Beast? Attacking Rate Limits of the Xen Hypervisor. 493-511 - Nethanel Gelernter, Amir Herzberg:

Autocomplete Injection Attack. 512-530 - Mohamed Sabt, Jacques Traoré:

Breaking into the KeyStore: A Practical Forgery Attack Against Android KeyStore. 531-548
Attribute-Based Cryptography
- Jianting Ning, Zhenfu Cao

, Xiaolei Dong, Junqing Gong, Jie Chen:
Traceable CP-ABE with Short Ciphertexts: How to Catch People Selling Decryption Devices on eBay Efficiently. 551-569 - Hui Cui

, Robert H. Deng
, Yingjiu Li, Baodong Qin:
Server-Aided Revocable Attribute-Based Encryption. 570-587 - Weiran Liu, Jianwei Liu

, Qianhong Wu, Bo Qin, Kaitai Liang
:
Online/Offline Public-Index Predicate Encryption for Fine-Grained Mobile Access Control. 588-605

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














