


default search action
18. ESORICS 2013: Egham, UK - DPM/SETOP
- Joaquín García-Alfaro

, Georgios V. Lioudakis
, Nora Cuppens-Boulahia, Simon N. Foley
, William M. Fitzgerald:
Data Privacy Management and Autonomous Spontaneous Security - 8th International Workshop, DPM 2013, and 6th International Workshop, SETOP 2013, Egham, UK, September 12-13, 2013, Revised Selected Papers. Lecture Notes in Computer Science 8247, Springer 2014, ISBN 978-3-642-54567-2
Keynote Address
- Steven J. Murdoch:

Quantifying and Measuring Anonymity. 3-13
Data Privacy Management
- Jan Hajny, Lukas Malina

, Zdenek Martinasek
, Ondrej Tethal:
Performance Evaluation of Primitives for Privacy-Enhancing Cryptography on Current Smart-Cards and Smart-Phones. 17-33 - Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama, Takeshi Koshiba

:
Practical Packing Method in Somewhat Homomorphic Encryption. 34-50 - Nelson Gonçalves, Rui José

, Carlos Baquero
:
Collaborative and Privacy-Aware Sensing for Observing Urban Movement Patterns. 51-65 - Mauro Barni, Massimo Bernaschi, Riccardo Lazzeretti, Tommaso Pignata, Alessandro Sabellico:

Parallel Implementation of GC-Based MPC Protocols in the Semi-Honest Setting. 66-82 - Florian Kammüller, Sören Preibusch:

Privacy Analysis of a Hidden Friendship Protocol. 83-99 - Arnau Vives-Guasch, Magdalena Payeras-Capellà

, Macià Mut Puigserver, Jordi Castellà-Roca
, Josep Lluís Ferrer-Gomila
:
Anonymous and Transferable Electronic Ticketing Scheme. 100-113 - Giovanni Di Crescenzo, Brian A. Coan, John L. Schultz, Simon Tsang, Rebecca N. Wright:

Privacy-Preserving Publish/Subscribe: Efficient Protocols in a Distributed Model. 114-132 - Erman Ayday, Jean Louis Raisaro

, Urs Hengartner, Adam Molyneaux, Jean-Pierre Hubaux:
Privacy-Preserving Processing of Raw Genomic Data. 133-147 - Arnau Erola, Jordi Castellà-Roca

:
Using Search Results to Microaggregate Query Logs Semantically. 148-161 - Manuel Munier, Vincent Lalanne, Pierre-Yves Ardoy, Magali Ricarde:

Legal Issues About Metadata Data Privacy vs Information Security. 162-177 - Georg Neugebauer, Lucas Brutschy, Ulrike Meyer, Susanne Wetzel:

Privacy-Preserving Multi-Party Reconciliation Secure in the Malicious Model. 178-193 - Michael Backes, Sebastian Meiser:

Differentially Private Smart Metering with Battery Recharging. 194-212 - Michael Backes, Sebastian Gerling, Christian Hammer

, Matteo Maffei, Philipp von Styp-Rekowsky:
AppGuard - Fine-Grained Policy Enforcement for Untrusted Android Applications. 213-231
Autonomous and Spontaneous Security
- Ronan-Alexandre Cherrueau, Rémi Douence, Jean-Claude Royer, Mario Südholt, Anderson Santana de Oliveira, Yves Roudier, Matteo Dell'Amico

:
Reference Monitors for Security and Interoperability in OAuth 2.0. 235-249 - Mads I. Ingwar, Christian Damsgaard Jensen

:
Remote Biometrics for Robust Persistent Authentication. 250-267 - Fabio Martinelli, Andrea Saracino

, Daniele Sgandurra:
Classifying Android Malware through Subgraph Mining. 268-283 - Gianluca Dini, Fabio Martinelli, Ilaria Matteucci

, Andrea Saracino
, Daniele Sgandurra:
Introducing Probabilities in Contract-Based Approaches for Mobile Application Security. 284-299 - Quentin Jérome, Samuel Marchal

, Radu State, Thomas Engel:
Advanced Detection Tool for PDF Threats. 300-315 - Gabriel Serme, Theodoor Scholte, Anderson Santana de Oliveira:

Enforcing Input Validation through Aspect Oriented Programming. 316-332 - Charalampos Manifavas, George Hatzivasilis, Konstantinos Fysarakis, Konstantinos Rantos:

Lightweight Cryptography for Embedded Systems - A Comparative Analysis. 333-349
Short Papers
- Michael Oehler, Dhananjay S. Phatak:

A Simulation of Document Detection Methods and Reducing False Positives for Private Stream Searching. 353-361 - Meilof Veeningen, Antonio Piepoli, Nicola Zannone

:
Are On-Line Personae Really Unlinkable? 369-379 - Kiavash Satvat, Matthew Forshaw

, Feng Hao
, Ehsan Toreini
:
On the Privacy of Private Browsing - A Forensic Approach. 380-389 - Oriol Farràs

, Josep Domingo-Ferrer
, Alberto Blanco-Justicia
:
Privacy-Preserving Trust Management Mechanisms from Private Matching Schemes. 390-398

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














