Search dblp for Publications

export results for "toc:db/conf/esorics/esorics2009.bht:"

 download as .bib file

@inproceedings{DBLP:conf/esorics/AizatulinSW09,
  author       = {Mihhail Aizatulin and
                  Henning Schnoor and
                  Thomas Wilke},
  editor       = {Michael Backes and
                  Peng Ning},
  title        = {Computationally Sound Analysis of a Probabilistic Contract Signing
                  Protocol},
  booktitle    = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research
                  in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5789},
  pages        = {571--586},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04444-1\_35},
  doi          = {10.1007/978-3-642-04444-1\_35},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/AizatulinSW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/BarniFKLSS09,
  author       = {Mauro Barni and
                  Pierluigi Failla and
                  Vladimir Kolesnikov and
                  Riccardo Lazzeretti and
                  Ahmad{-}Reza Sadeghi and
                  Thomas Schneider},
  editor       = {Michael Backes and
                  Peng Ning},
  title        = {Secure Evaluation of Private Linear Branching Programs with Medical
                  Applications},
  booktitle    = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research
                  in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5789},
  pages        = {424--439},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04444-1\_26},
  doi          = {10.1007/978-3-642-04444-1\_26},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/BarniFKLSS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/BasinBK09,
  author       = {David A. Basin and
                  Samuel J. Burri and
                  G{\"{u}}nter Karjoth},
  editor       = {Michael Backes and
                  Peng Ning},
  title        = {Dynamic Enforcement of Abstract Separation of Duty Constraints},
  booktitle    = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research
                  in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5789},
  pages        = {250--267},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04444-1\_16},
  doi          = {10.1007/978-3-642-04444-1\_16},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/BasinBK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/BetheaR09,
  author       = {Darrell Bethea and
                  Michael K. Reiter},
  editor       = {Michael Backes and
                  Peng Ning},
  title        = {Data Structures with Unpredictable Timing},
  booktitle    = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research
                  in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5789},
  pages        = {456--471},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04444-1\_28},
  doi          = {10.1007/978-3-642-04444-1\_28},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/BetheaR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/BiskupGSW09,
  author       = {Joachim Biskup and
                  Christian Gogolin and
                  Jens Seiler and
                  Torben Weibert},
  editor       = {Michael Backes and
                  Peng Ning},
  title        = {Requirements and Protocols for Inference-Proof Interactions in Information
                  Systems},
  booktitle    = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research
                  in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5789},
  pages        = {285--302},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04444-1\_18},
  doi          = {10.1007/978-3-642-04444-1\_18},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/BiskupGSW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/BobbaKP09,
  author       = {Rakeshbabu Bobba and
                  Himanshu Khurana and
                  Manoj Prabhakaran},
  editor       = {Michael Backes and
                  Peng Ning},
  title        = {Attribute-Sets: {A} Practically Motivated Enhancement to Attribute-Based
                  Encryption},
  booktitle    = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research
                  in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5789},
  pages        = {587--604},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04444-1\_36},
  doi          = {10.1007/978-3-642-04444-1\_36},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/BobbaKP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/CentenaroFLS09,
  author       = {Matteo Centenaro and
                  Riccardo Focardi and
                  Flaminia L. Luccio and
                  Graham Steel},
  editor       = {Michael Backes and
                  Peng Ning},
  title        = {Type-Based Analysis of {PIN} Processing APIs},
  booktitle    = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research
                  in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5789},
  pages        = {53--68},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04444-1\_4},
  doi          = {10.1007/978-3-642-04444-1\_4},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/CentenaroFLS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/ChaudhuriG09,
  author       = {Avik Chaudhuri and
                  Deepak Garg},
  editor       = {Michael Backes and
                  Peng Ning},
  title        = {{PCAL:} Language Support for Proof-Carrying Authorization Systems},
  booktitle    = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research
                  in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5789},
  pages        = {184--199},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04444-1\_12},
  doi          = {10.1007/978-3-642-04444-1\_12},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/ChaudhuriG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/ChenC09,
  author       = {Liang Chen and
                  Jason Crampton},
  editor       = {Michael Backes and
                  Peng Ning},
  title        = {Set Covering Problems in Role-Based Access Control},
  booktitle    = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research
                  in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5789},
  pages        = {689--704},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04444-1\_42},
  doi          = {10.1007/978-3-642-04444-1\_42},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/ChenC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/CirianiVFJPS09,
  author       = {Valentina Ciriani and
                  Sabrina De Capitani di Vimercati and
                  Sara Foresti and
                  Sushil Jajodia and
                  Stefano Paraboschi and
                  Pierangela Samarati},
  editor       = {Michael Backes and
                  Peng Ning},
  title        = {Keep a Few: Outsourcing Data While Maintaining Confidentiality},
  booktitle    = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research
                  in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5789},
  pages        = {440--455},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04444-1\_27},
  doi          = {10.1007/978-3-642-04444-1\_27},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/CirianiVFJPS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/CortierS09,
  author       = {V{\'{e}}ronique Cortier and
                  Graham Steel},
  editor       = {Michael Backes and
                  Peng Ning},
  title        = {A Generic Security {API} for Symmetric Key Management on Cryptographic
                  Devices},
  booktitle    = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research
                  in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5789},
  pages        = {605--620},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04444-1\_37},
  doi          = {10.1007/978-3-642-04444-1\_37},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/CortierS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/CrescenzoJS09,
  author       = {Giovanni Di Crescenzo and
                  Shaoquan Jiang and
                  Reihaneh Safavi{-}Naini},
  editor       = {Michael Backes and
                  Peng Ning},
  title        = {Corruption-Localizing Hashing},
  booktitle    = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research
                  in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5789},
  pages        = {489--504},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04444-1\_30},
  doi          = {10.1007/978-3-642-04444-1\_30},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/CrescenzoJS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/CrosbyW09,
  author       = {Scott A. Crosby and
                  Dan S. Wallach},
  editor       = {Michael Backes and
                  Peng Ning},
  title        = {Super-Efficient Aggregating History-Independent Persistent Authenticated
                  Dictionaries},
  booktitle    = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research
                  in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5789},
  pages        = {671--688},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04444-1\_41},
  doi          = {10.1007/978-3-642-04444-1\_41},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/CrosbyW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/DanezisDKT09,
  author       = {George Danezis and
                  Claudia D{\'{\i}}az and
                  Emilia K{\"{a}}sper and
                  Carmela Troncoso},
  editor       = {Michael Backes and
                  Peng Ning},
  title        = {The Wisdom of Crowds: Attacks and Optimal Constructions},
  booktitle    = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research
                  in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5789},
  pages        = {406--423},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04444-1\_25},
  doi          = {10.1007/978-3-642-04444-1\_25},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/DanezisDKT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/DavidsonSDJ09,
  author       = {Drew Davidson and
                  Randy Smith and
                  Nic Doyle and
                  Somesh Jha},
  editor       = {Michael Backes and
                  Peng Ning},
  title        = {Protocol Normalization Using Attribute Grammars},
  booktitle    = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research
                  in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5789},
  pages        = {216--231},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04444-1\_14},
  doi          = {10.1007/978-3-642-04444-1\_14},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/DavidsonSDJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/DeursenMRV09,
  author       = {Ton van Deursen and
                  Sjouke Mauw and
                  Sasa Radomirovic and
                  Pim Vullers},
  editor       = {Michael Backes and
                  Peng Ning},
  title        = {Secure Ownership and Ownership Transfer in {RFID} Systems},
  booktitle    = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research
                  in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5789},
  pages        = {637--654},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04444-1\_39},
  doi          = {10.1007/978-3-642-04444-1\_39},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/DeursenMRV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/EneLN09,
  author       = {Cristian Ene and
                  Yassine Lakhnech and
                  Van Chan Ngo},
  editor       = {Michael Backes and
                  Peng Ning},
  title        = {Formal Indistinguishability Extended to the Random Oracle Model},
  booktitle    = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research
                  in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5789},
  pages        = {555--570},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04444-1\_34},
  doi          = {10.1007/978-3-642-04444-1\_34},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/EneLN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/FongAZ09,
  author       = {Philip W. L. Fong and
                  Mohd M. Anwar and
                  Zhen Zhao},
  editor       = {Michael Backes and
                  Peng Ning},
  title        = {A Privacy Preservation Model for Facebook-Style Social Network Systems},
  booktitle    = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research
                  in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5789},
  pages        = {303--320},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04444-1\_19},
  doi          = {10.1007/978-3-642-04444-1\_19},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/FongAZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/GiladH09,
  author       = {Yossi Gilad and
                  Amir Herzberg},
  editor       = {Michael Backes and
                  Peng Ning},
  title        = {Lightweight Opportunistic Tunneling {(LOT)}},
  booktitle    = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research
                  in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5789},
  pages        = {104--119},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04444-1\_7},
  doi          = {10.1007/978-3-642-04444-1\_7},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/GiladH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/GutsFN09,
  author       = {Nataliya Guts and
                  C{\'{e}}dric Fournet and
                  Francesco Zappa Nardelli},
  editor       = {Michael Backes and
                  Peng Ning},
  title        = {Reliable Evidence: Auditability by Typing},
  booktitle    = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research
                  in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5789},
  pages        = {168--183},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04444-1\_11},
  doi          = {10.1007/978-3-642-04444-1\_11},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/GutsFN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/HolzEF09,
  author       = {Thorsten Holz and
                  Markus Engelberth and
                  Felix C. Freiling},
  editor       = {Michael Backes and
                  Peng Ning},
  title        = {Learning More about the Underground Economy: {A} Case-Study of Keyloggers
                  and Dropzones},
  booktitle    = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research
                  in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5789},
  pages        = {1--18},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04444-1\_1},
  doi          = {10.1007/978-3-642-04444-1\_1},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/HolzEF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/JagadeesanJPR09,
  author       = {Radha Jagadeesan and
                  Alan Jeffrey and
                  Corin Pitcher and
                  James Riely},
  editor       = {Michael Backes and
                  Peng Ning},
  title        = {Towards a Theory of Accountability and Audit},
  booktitle    = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research
                  in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5789},
  pages        = {152--167},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04444-1\_10},
  doi          = {10.1007/978-3-642-04444-1\_10},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/JagadeesanJPR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/LeMayG09,
  author       = {Michael LeMay and
                  Carl A. Gunter},
  editor       = {Michael Backes and
                  Peng Ning},
  title        = {Cumulative Attestation Kernels for Embedded Systems},
  booktitle    = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research
                  in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5789},
  pages        = {655--670},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04444-1\_40},
  doi          = {10.1007/978-3-642-04444-1\_40},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/LeMayG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/LiML09,
  author       = {Tiancheng Li and
                  Xiaonan Ma and
                  Ninghui Li},
  editor       = {Michael Backes and
                  Peng Ning},
  title        = {{WORM-SEAL:} Trustworthy Data Retention and Verification for Regulatory
                  Compliance},
  booktitle    = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research
                  in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5789},
  pages        = {472--488},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04444-1\_29},
  doi          = {10.1007/978-3-642-04444-1\_29},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/LiML09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/LiuGASSK09,
  author       = {Yali Liu and
                  Dipak Ghosal and
                  Frederik Armknecht and
                  Ahmad{-}Reza Sadeghi and
                  Steffen Schulz and
                  Stefan Katzenbeisser},
  editor       = {Michael Backes and
                  Peng Ning},
  title        = {Hide and Seek in Time - Robust Covert Timing Channels},
  booktitle    = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research
                  in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5789},
  pages        = {120--135},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04444-1\_8},
  doi          = {10.1007/978-3-642-04444-1\_8},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/LiuGASSK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/LuxM09,
  author       = {Alexander Lux and
                  Heiko Mantel},
  editor       = {Michael Backes and
                  Peng Ning},
  title        = {Declassification with Explicit Reference Points},
  booktitle    = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research
                  in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5789},
  pages        = {69--85},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04444-1\_5},
  doi          = {10.1007/978-3-642-04444-1\_5},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/LuxM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/MaffeisMT09,
  author       = {Sergio Maffeis and
                  John C. Mitchell and
                  Ankur Taly},
  editor       = {Michael Backes and
                  Peng Ning},
  title        = {Isolating JavaScript with Filters, Rewriting, and Wrappers},
  booktitle    = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research
                  in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5789},
  pages        = {505--522},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04444-1\_31},
  doi          = {10.1007/978-3-642-04444-1\_31},
  timestamp    = {Sun, 12 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/MaffeisMT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/MashimaAK09,
  author       = {Daisuke Mashima and
                  Mustaque Ahamad and
                  Swagath Kannan},
  editor       = {Michael Backes and
                  Peng Ning},
  title        = {User-Centric Handling of Identity Agent Compromise},
  booktitle    = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research
                  in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5789},
  pages        = {19--36},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04444-1\_2},
  doi          = {10.1007/978-3-642-04444-1\_2},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/MashimaAK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/ModersheimV09,
  author       = {Sebastian M{\"{o}}dersheim and
                  Luca Vigan{\`{o}}},
  editor       = {Michael Backes and
                  Peng Ning},
  title        = {Secure Pseudonymous Channels},
  booktitle    = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research
                  in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5789},
  pages        = {337--354},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04444-1\_21},
  doi          = {10.1007/978-3-642-04444-1\_21},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/ModersheimV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/NgSMS09,
  author       = {Ching Yu Ng and
                  Willy Susilo and
                  Yi Mu and
                  Reihaneh Safavi{-}Naini},
  editor       = {Michael Backes and
                  Peng Ning},
  title        = {New Privacy Results on Synchronized {RFID} Authentication Protocols
                  against Tag Tracing},
  booktitle    = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research
                  in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5789},
  pages        = {321--336},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04444-1\_20},
  doi          = {10.1007/978-3-642-04444-1\_20},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/NgSMS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/OpreaB09,
  author       = {Alina Oprea and
                  Kevin D. Bowers},
  editor       = {Michael Backes and
                  Peng Ning},
  title        = {Authentic Time-Stamps for Archival Storage},
  booktitle    = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research
                  in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5789},
  pages        = {136--151},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04444-1\_9},
  doi          = {10.1007/978-3-642-04444-1\_9},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/OpreaB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/PengZCG09,
  author       = {Yanlin Peng and
                  Linfeng Zhang and
                  J. Morris Chang and
                  Yong Guan},
  editor       = {Michael Backes and
                  Peng Ning},
  title        = {An Effective Method for Combating Malicious Scripts Clickbots},
  booktitle    = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research
                  in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5789},
  pages        = {523--538},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04444-1\_32},
  doi          = {10.1007/978-3-642-04444-1\_32},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/PengZCG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/RussoSC09,
  author       = {Alejandro Russo and
                  Andrei Sabelfeld and
                  Andrey Chudnov},
  editor       = {Michael Backes and
                  Peng Ning},
  title        = {Tracking Information Flow in Dynamic Tree Structures},
  booktitle    = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research
                  in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5789},
  pages        = {86--103},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04444-1\_6},
  doi          = {10.1007/978-3-642-04444-1\_6},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/RussoSC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/ShankesiASGM09,
  author       = {Ravinder Shankesi and
                  Musab AlTurki and
                  Ralf Sasse and
                  Carl A. Gunter and
                  Jos{\'{e}} Meseguer},
  editor       = {Michael Backes and
                  Peng Ning},
  title        = {Model-Checking DoS Amplification for VoIP Session Initiation},
  booktitle    = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research
                  in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5789},
  pages        = {390--405},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04444-1\_24},
  doi          = {10.1007/978-3-642-04444-1\_24},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/ShankesiASGM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/StuderP09,
  author       = {Ahren Studer and
                  Adrian Perrig},
  editor       = {Michael Backes and
                  Peng Ning},
  title        = {The Coremelt Attack},
  booktitle    = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research
                  in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5789},
  pages        = {37--52},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04444-1\_3},
  doi          = {10.1007/978-3-642-04444-1\_3},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/StuderP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/SunXS09,
  author       = {Fangqi Sun and
                  Liang Xu and
                  Zhendong Su},
  editor       = {Michael Backes and
                  Peng Ning},
  title        = {Client-Side Detection of {XSS} Worms by Monitoring Payload Propagation},
  booktitle    = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research
                  in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5789},
  pages        = {539--554},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04444-1\_33},
  doi          = {10.1007/978-3-642-04444-1\_33},
  timestamp    = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/SunXS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/TippenhauerC09,
  author       = {Nils Ole Tippenhauer and
                  Srdjan Capkun},
  editor       = {Michael Backes and
                  Peng Ning},
  title        = {ID-Based Secure Distance Bounding and Localization},
  booktitle    = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research
                  in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5789},
  pages        = {621--636},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04444-1\_38},
  doi          = {10.1007/978-3-642-04444-1\_38},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/TippenhauerC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/TriukoseAR09,
  author       = {Sipat Triukose and
                  Zakaria Al{-}Qudah and
                  Michael Rabinovich},
  editor       = {Michael Backes and
                  Peng Ning},
  title        = {Content Delivery Networks: Protection or Threat?},
  booktitle    = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research
                  in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5789},
  pages        = {371--389},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04444-1\_23},
  doi          = {10.1007/978-3-642-04444-1\_23},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/TriukoseAR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/WangJCWG09,
  author       = {Zhi Wang and
                  Xuxian Jiang and
                  Weidong Cui and
                  Xinyuan Wang and
                  Mike Grace},
  editor       = {Michael Backes and
                  Peng Ning},
  title        = {ReFormat: Automatic Reverse Engineering of Encrypted Messages},
  booktitle    = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research
                  in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5789},
  pages        = {200--215},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04444-1\_13},
  doi          = {10.1007/978-3-642-04444-1\_13},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/WangJCWG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/WangJL09,
  author       = {Qihua Wang and
                  Hongxia Jin and
                  Ninghui Li},
  editor       = {Michael Backes and
                  Peng Ning},
  title        = {Usable Access Control in Collaborative Environments: Authorization
                  Based on People-Tagging},
  booktitle    = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research
                  in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5789},
  pages        = {268--284},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04444-1\_17},
  doi          = {10.1007/978-3-642-04444-1\_17},
  timestamp    = {Thu, 28 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/WangJL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/WangWLRL09,
  author       = {Qian Wang and
                  Cong Wang and
                  Jin Li and
                  Kui Ren and
                  Wenjing Lou},
  editor       = {Michael Backes and
                  Peng Ning},
  title        = {Enabling Public Verifiability and Data Dynamics for Storage Security
                  in Cloud Computing},
  booktitle    = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research
                  in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5789},
  pages        = {355--370},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04444-1\_22},
  doi          = {10.1007/978-3-642-04444-1\_22},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/WangWLRL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/WurzingerBHGKK09,
  author       = {Peter Wurzinger and
                  Leyla Bilge and
                  Thorsten Holz and
                  Jan Goebel and
                  Christopher Kruegel and
                  Engin Kirda},
  editor       = {Michael Backes and
                  Peng Ning},
  title        = {Automatically Generating Models for Botnet Detection},
  booktitle    = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research
                  in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5789},
  pages        = {232--249},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04444-1\_15},
  doi          = {10.1007/978-3-642-04444-1\_15},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/WurzingerBHGKK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2009,
  editor       = {Michael Backes and
                  Peng Ning},
  title        = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research
                  in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5789},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04444-1},
  doi          = {10.1007/978-3-642-04444-1},
  isbn         = {978-3-642-04443-4},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics