Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/esorics/lncs8872.bht:"
@proceedings{DBLP:conf/esorics/2014-8872, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Jordi Herrera{-}Joancomart{\'{\i}} and Emil Lupu and Joachim Posegga and Alessandro Aldini and Fabio Martinelli and Neeraj Suri}, title = {Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance - 9th International Workshop, {DPM} 2014, 7th International Workshop, {SETOP} 2014, and 3rd International Workshop, {QASA} 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8872}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-17016-9}, doi = {10.1007/978-3-319-17016-9}, isbn = {978-3-319-17015-2}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/2014-8872.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/AbughazalahMM14, author = {Sarah Abughazalah and Konstantinos Markantonakis and Keith Mayes}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Jordi Herrera{-}Joancomart{\'{\i}} and Emil Lupu and Joachim Posegga and Alessandro Aldini and Fabio Martinelli and Neeraj Suri}, title = {Secure Improved Cloud-Based {RFID} Authentication Protocol}, booktitle = {Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance - 9th International Workshop, {DPM} 2014, 7th International Workshop, {SETOP} 2014, and 3rd International Workshop, {QASA} 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8872}, pages = {147--164}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-17016-9\_10}, doi = {10.1007/978-3-319-17016-9\_10}, timestamp = {Sun, 25 Oct 2020 22:34:57 +0100}, biburl = {https://dblp.org/rec/conf/esorics/AbughazalahMM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/ArmandoBMS14, author = {Alessandro Armando and Michele Bezzi and Nadia Metoui and Antonino Sabetta}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Jordi Herrera{-}Joancomart{\'{\i}} and Emil Lupu and Joachim Posegga and Alessandro Aldini and Fabio Martinelli and Neeraj Suri}, title = {Risk-Aware Information Disclosure}, booktitle = {Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance - 9th International Workshop, {DPM} 2014, 7th International Workshop, {SETOP} 2014, and 3rd International Workshop, {QASA} 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8872}, pages = {266--276}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-17016-9\_17}, doi = {10.1007/978-3-319-17016-9\_17}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/ArmandoBMS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/AzraouiEOBOS14, author = {Monir Azraoui and Kaoutar Elkhiyaoui and Melek {\"{O}}nen and Karin Bernsmed and Anderson Santana de Oliveira and Jakub Sendor}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Jordi Herrera{-}Joancomart{\'{\i}} and Emil Lupu and Joachim Posegga and Alessandro Aldini and Fabio Martinelli and Neeraj Suri}, title = {{A-PPL:} An Accountability Policy Language}, booktitle = {Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance - 9th International Workshop, {DPM} 2014, 7th International Workshop, {SETOP} 2014, and 3rd International Workshop, {QASA} 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8872}, pages = {319--326}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-17016-9\_21}, doi = {10.1007/978-3-319-17016-9\_21}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/AzraouiEOBOS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/BeckersKY14, author = {Kristian Beckers and Leanid Krautsevich and Artsiom Yautsiukhin}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Jordi Herrera{-}Joancomart{\'{\i}} and Emil Lupu and Joachim Posegga and Alessandro Aldini and Fabio Martinelli and Neeraj Suri}, title = {Analysis of Social Engineering Threats with Attack Graphs}, booktitle = {Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance - 9th International Workshop, {DPM} 2014, 7th International Workshop, {SETOP} 2014, and 3rd International Workshop, {QASA} 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8872}, pages = {216--232}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-17016-9\_14}, doi = {10.1007/978-3-319-17016-9\_14}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/BeckersKY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/Bertino14, author = {Elisa Bertino}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Jordi Herrera{-}Joancomart{\'{\i}} and Emil Lupu and Joachim Posegga and Alessandro Aldini and Fabio Martinelli and Neeraj Suri}, title = {Data Trustworthiness - Approaches and Research Challenges}, booktitle = {Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance - 9th International Workshop, {DPM} 2014, 7th International Workshop, {SETOP} 2014, and 3rd International Workshop, {QASA} 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8872}, pages = {17--25}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-17016-9\_2}, doi = {10.1007/978-3-319-17016-9\_2}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/Bertino14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/Blanco-Justicia14, author = {Alberto Blanco{-}Justicia and Josep Domingo{-}Ferrer}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Jordi Herrera{-}Joancomart{\'{\i}} and Emil Lupu and Joachim Posegga and Alessandro Aldini and Fabio Martinelli and Neeraj Suri}, title = {Privacy-Preserving Loyalty Programs}, booktitle = {Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance - 9th International Workshop, {DPM} 2014, 7th International Workshop, {SETOP} 2014, and 3rd International Workshop, {QASA} 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8872}, pages = {133--146}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-17016-9\_9}, doi = {10.1007/978-3-319-17016-9\_9}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/Blanco-Justicia14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/BouyahiaICCA14, author = {Tarek Bouyahia and Muhammad Sabir Idrees and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Fabien Autrel}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Jordi Herrera{-}Joancomart{\'{\i}} and Emil Lupu and Joachim Posegga and Alessandro Aldini and Fabio Martinelli and Neeraj Suri}, title = {Metric for Security Activities Assisted by Argumentative Logic}, booktitle = {Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance - 9th International Workshop, {DPM} 2014, 7th International Workshop, {SETOP} 2014, and 3rd International Workshop, {QASA} 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8872}, pages = {183--197}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-17016-9\_12}, doi = {10.1007/978-3-319-17016-9\_12}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/BouyahiaICCA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/ChothiaNS14, author = {Tom Chothia and Chris Novakovic and Rajiv Ranjan Singh}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Jordi Herrera{-}Joancomart{\'{\i}} and Emil Lupu and Joachim Posegga and Alessandro Aldini and Fabio Martinelli and Neeraj Suri}, title = {Automatically Calculating Quantitative Integrity Measures for Imperative Programs}, booktitle = {Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance - 9th International Workshop, {DPM} 2014, 7th International Workshop, {SETOP} 2014, and 3rd International Workshop, {QASA} 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8872}, pages = {250--265}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-17016-9\_16}, doi = {10.1007/978-3-319-17016-9\_16}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/ChothiaNS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/Domingo-FerrerB14, author = {Josep Domingo{-}Ferrer and Alberto Blanco{-}Justicia}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Jordi Herrera{-}Joancomart{\'{\i}} and Emil Lupu and Joachim Posegga and Alessandro Aldini and Fabio Martinelli and Neeraj Suri}, title = {Group Discounts Compatible with Buyer Privacy}, booktitle = {Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance - 9th International Workshop, {DPM} 2014, 7th International Workshop, {SETOP} 2014, and 3rd International Workshop, {QASA} 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8872}, pages = {47--57}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-17016-9\_4}, doi = {10.1007/978-3-319-17016-9\_4}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/Domingo-FerrerB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/FerreiraRLD14, author = {Bernardo Ferreira and Jo{\~{a}}o Rodrigues and Jo{\~{a}}o Leit{\~{a}}o and Henrique Jo{\~{a}}o L. Domingos}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Jordi Herrera{-}Joancomart{\'{\i}} and Emil Lupu and Joachim Posegga and Alessandro Aldini and Fabio Martinelli and Neeraj Suri}, title = {Towards an Image Encryption Scheme with Content-Based Image Retrieval Properties}, booktitle = {Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance - 9th International Workshop, {DPM} 2014, 7th International Workshop, {SETOP} 2014, and 3rd International Workshop, {QASA} 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8872}, pages = {311--318}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-17016-9\_20}, doi = {10.1007/978-3-319-17016-9\_20}, timestamp = {Fri, 24 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/FerreiraRLD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/GambsRT14, author = {S{\'{e}}bastien Gambs and Samuel Ranellucci and Alain Tapp}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Jordi Herrera{-}Joancomart{\'{\i}} and Emil Lupu and Joachim Posegga and Alessandro Aldini and Fabio Martinelli and Neeraj Suri}, title = {The Crypto-Democracy and the Trustworthy (Position Paper)}, booktitle = {Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance - 9th International Workshop, {DPM} 2014, 7th International Workshop, {SETOP} 2014, and 3rd International Workshop, {QASA} 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8872}, pages = {58--76}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-17016-9\_5}, doi = {10.1007/978-3-319-17016-9\_5}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/GambsRT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/HamzaouiMCR14, author = {Amel Hamzaoui and Qutaibah M. Malluhi and Chris Clifton and Ryan D. Riley}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Jordi Herrera{-}Joancomart{\'{\i}} and Emil Lupu and Joachim Posegga and Alessandro Aldini and Fabio Martinelli and Neeraj Suri}, title = {Association Rule Mining on Fragmented Database}, booktitle = {Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance - 9th International Workshop, {DPM} 2014, 7th International Workshop, {SETOP} 2014, and 3rd International Workshop, {QASA} 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8872}, pages = {335--342}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-17016-9\_23}, doi = {10.1007/978-3-319-17016-9\_23}, timestamp = {Thu, 17 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/HamzaouiMCR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/HartogM14, author = {Jerry den Hartog and Ilaria Matteucci}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Jordi Herrera{-}Joancomart{\'{\i}} and Emil Lupu and Joachim Posegga and Alessandro Aldini and Fabio Martinelli and Neeraj Suri}, title = {Introducing Probabilities in Controller Strategies}, booktitle = {Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance - 9th International Workshop, {DPM} 2014, 7th International Workshop, {SETOP} 2014, and 3rd International Workshop, {QASA} 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8872}, pages = {233--249}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-17016-9\_15}, doi = {10.1007/978-3-319-17016-9\_15}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/HartogM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/Herrera-Joancomarti14, author = {Jordi Herrera{-}Joancomart{\'{\i}}}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Jordi Herrera{-}Joancomart{\'{\i}} and Emil Lupu and Joachim Posegga and Alessandro Aldini and Fabio Martinelli and Neeraj Suri}, title = {Research and Challenges on Bitcoin Anonymity}, booktitle = {Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance - 9th International Workshop, {DPM} 2014, 7th International Workshop, {SETOP} 2014, and 3rd International Workshop, {QASA} 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8872}, pages = {3--16}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-17016-9\_1}, doi = {10.1007/978-3-319-17016-9\_1}, timestamp = {Fri, 02 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/Herrera-Joancomarti14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/Jardi-CedoCV14, author = {Roger Jard{\'{\i}}{-}Ced{\'{o}} and Jordi Castell{\`{a}}{-}Roca and Alexandre Viejo}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Jordi Herrera{-}Joancomart{\'{\i}} and Emil Lupu and Joachim Posegga and Alessandro Aldini and Fabio Martinelli and Neeraj Suri}, title = {Privacy-Preserving Electronic Toll System with Dynamic Pricing for Low Emission Zones}, booktitle = {Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance - 9th International Workshop, {DPM} 2014, 7th International Workshop, {SETOP} 2014, and 3rd International Workshop, {QASA} 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8872}, pages = {327--334}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-17016-9\_22}, doi = {10.1007/978-3-319-17016-9\_22}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/Jardi-CedoCV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/JohansenJ14, author = {Christian Johansen and Audun J{\o}sang}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Jordi Herrera{-}Joancomart{\'{\i}} and Emil Lupu and Joachim Posegga and Alessandro Aldini and Fabio Martinelli and Neeraj Suri}, title = {Probabilistic Modelling of Humans in Security Ceremonies}, booktitle = {Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance - 9th International Workshop, {DPM} 2014, 7th International Workshop, {SETOP} 2014, and 3rd International Workshop, {QASA} 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8872}, pages = {277--292}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-17016-9\_18}, doi = {10.1007/978-3-319-17016-9\_18}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/JohansenJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/Josang14, author = {Audun J{\o}sang}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Jordi Herrera{-}Joancomart{\'{\i}} and Emil Lupu and Joachim Posegga and Alessandro Aldini and Fabio Martinelli and Neeraj Suri}, title = {Assurance Requirements for Mutual User and Service Provider Authentication}, booktitle = {Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance - 9th International Workshop, {DPM} 2014, 7th International Workshop, {SETOP} 2014, and 3rd International Workshop, {QASA} 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8872}, pages = {26--44}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-17016-9\_3}, doi = {10.1007/978-3-319-17016-9\_3}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/Josang14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/KohlerH14, author = {Jens K{\"{o}}hler and Hannes Hartenstein}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Jordi Herrera{-}Joancomart{\'{\i}} and Emil Lupu and Joachim Posegga and Alessandro Aldini and Fabio Martinelli and Neeraj Suri}, title = {Index Optimization for L-Diversified Database-as-a-Service}, booktitle = {Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance - 9th International Workshop, {DPM} 2014, 7th International Workshop, {SETOP} 2014, and 3rd International Workshop, {QASA} 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8872}, pages = {114--132}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-17016-9\_8}, doi = {10.1007/978-3-319-17016-9\_8}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/KohlerH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/KoukoviniPLDKV14, author = {Maria N. Koukovini and Eugenia I. Papagiannakopoulou and Georgios V. Lioudakis and Nikolaos L. Dellas and Dimitra I. Kaklamani and Iakovos S. Venieris}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Jordi Herrera{-}Joancomart{\'{\i}} and Emil Lupu and Joachim Posegga and Alessandro Aldini and Fabio Martinelli and Neeraj Suri}, title = {Towards Inherent Privacy Awareness in Workflows}, booktitle = {Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance - 9th International Workshop, {DPM} 2014, 7th International Workshop, {SETOP} 2014, and 3rd International Workshop, {QASA} 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8872}, pages = {95--113}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-17016-9\_7}, doi = {10.1007/978-3-319-17016-9\_7}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/KoukoviniPLDKV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/NavalLGRRC14, author = {Smita Naval and Vijay Laxmi and Manoj Singh Gaur and Sachin Raja and Muttukrishnan Rajarajan and Mauro Conti}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Jordi Herrera{-}Joancomart{\'{\i}} and Emil Lupu and Joachim Posegga and Alessandro Aldini and Fabio Martinelli and Neeraj Suri}, title = {Environment-Reactive Malware Behavior: Detection and Categorization}, booktitle = {Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance - 9th International Workshop, {DPM} 2014, 7th International Workshop, {SETOP} 2014, and 3rd International Workshop, {QASA} 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8872}, pages = {167--182}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-17016-9\_11}, doi = {10.1007/978-3-319-17016-9\_11}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/NavalLGRRC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/PietersD14, author = {Wolter Pieters and Mohsen Davarynejad}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Jordi Herrera{-}Joancomart{\'{\i}} and Emil Lupu and Joachim Posegga and Alessandro Aldini and Fabio Martinelli and Neeraj Suri}, title = {Calculating Adversarial Risk from Attack Trees: Control Strength and Probabilistic Attackers}, booktitle = {Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance - 9th International Workshop, {DPM} 2014, 7th International Workshop, {SETOP} 2014, and 3rd International Workshop, {QASA} 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8872}, pages = {201--215}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-17016-9\_13}, doi = {10.1007/978-3-319-17016-9\_13}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/PietersD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/PuysRBL14, author = {Maxime Puys and Lionel Rivi{\`{e}}re and Julien Bringer and Thanh{-}Ha Le}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Jordi Herrera{-}Joancomart{\'{\i}} and Emil Lupu and Joachim Posegga and Alessandro Aldini and Fabio Martinelli and Neeraj Suri}, title = {High-Level Simulation for Multiple Fault Injection Evaluation}, booktitle = {Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance - 9th International Workshop, {DPM} 2014, 7th International Workshop, {SETOP} 2014, and 3rd International Workshop, {QASA} 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8872}, pages = {293--308}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-17016-9\_19}, doi = {10.1007/978-3-319-17016-9\_19}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/PuysRBL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/Tschersich14, author = {Markus Tschersich}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Jordi Herrera{-}Joancomart{\'{\i}} and Emil Lupu and Joachim Posegga and Alessandro Aldini and Fabio Martinelli and Neeraj Suri}, title = {Configuration Behavior of Restrictive Default Privacy Settings on Social Network Sites - Analyzing the Combined Effect of Default Settings and Interface Style}, booktitle = {Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance - 9th International Workshop, {DPM} 2014, 7th International Workshop, {SETOP} 2014, and 3rd International Workshop, {QASA} 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8872}, pages = {77--94}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-17016-9\_6}, doi = {10.1007/978-3-319-17016-9\_6}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/Tschersich14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.