Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/esorics/esorics2013.bht:"
@inproceedings{DBLP:conf/esorics/0004R13, author = {Lei Wei and Michael K. Reiter}, editor = {Jason Crampton and Sushil Jajodia and Keith Mayes}, title = {Ensuring File Authenticity in Private {DFA} Evaluation on Encrypted Files in the Cloud}, booktitle = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8134}, pages = {147--163}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40203-6\_9}, doi = {10.1007/978-3-642-40203-6\_9}, timestamp = {Wed, 25 Sep 2019 18:03:15 +0200}, biburl = {https://dblp.org/rec/conf/esorics/0004R13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/AkhaweLHSS13, author = {Devdatta Akhawe and Frank Li and Warren He and Prateek Saxena and Dawn Song}, editor = {Jason Crampton and Sushil Jajodia and Keith Mayes}, title = {Data-Confined {HTML5} Applications}, booktitle = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8134}, pages = {736--754}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40203-6\_41}, doi = {10.1007/978-3-642-40203-6\_41}, timestamp = {Tue, 21 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/AkhaweLHSS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/BackesFM13, author = {Michael Backes and Dario Fiore and Esfandiar Mohammadi}, editor = {Jason Crampton and Sushil Jajodia and Keith Mayes}, title = {Privacy-Preserving Accountable Computation}, booktitle = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8134}, pages = {38--56}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40203-6\_3}, doi = {10.1007/978-3-642-40203-6\_3}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/BackesFM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/BarberaKPK13, author = {Marco Valerio Barbera and Vasileios P. Kemerlis and Vasilis Pappas and Angelos D. Keromytis}, editor = {Jason Crampton and Sushil Jajodia and Keith Mayes}, title = {CellFlood: Attacking Tor Onion Routers on the Cheap}, booktitle = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8134}, pages = {664--681}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40203-6\_37}, doi = {10.1007/978-3-642-40203-6\_37}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/BarberaKPK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/BoydCFPPS13, author = {Colin Boyd and Cas Cremers and Mich{\`{e}}le Feltz and Kenneth G. Paterson and Bertram Poettering and Douglas Stebila}, editor = {Jason Crampton and Sushil Jajodia and Keith Mayes}, title = {{ASICS:} Authenticated Key Exchange Security Incorporating Certification Systems}, booktitle = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8134}, pages = {381--399}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40203-6\_22}, doi = {10.1007/978-3-642-40203-6\_22}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/BoydCFPPS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/CamenischES13, author = {Jan Camenisch and Robert R. Enderlein and Victor Shoup}, editor = {Jason Crampton and Sushil Jajodia and Keith Mayes}, title = {Practical and Employable Protocols for UC-Secure Circuit Evaluation over {\(\mathbb{Z}\)}n}, booktitle = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8134}, pages = {19--37}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40203-6\_2}, doi = {10.1007/978-3-642-40203-6\_2}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/CamenischES13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/CaseldenBPMS13, author = {Dan Caselden and Alex Bazhanyuk and Mathias Payer and Stephen McCamant and Dawn Song}, editor = {Jason Crampton and Sushil Jajodia and Keith Mayes}, title = {{HI-CFG:} Construction by Binary Analysis and Application to Attack Polymorphism}, booktitle = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8134}, pages = {164--181}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40203-6\_10}, doi = {10.1007/978-3-642-40203-6\_10}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/CaseldenBPMS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/ClarkMRSFX13, author = {Shane S. Clark and Hossen Asiful Mustafa and Benjamin Ransford and Jacob Sorber and Kevin Fu and Wenyuan Xu}, editor = {Jason Crampton and Sushil Jajodia and Keith Mayes}, title = {Current Events: Identifying Webpages by Tapping the Electrical Outlet}, booktitle = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8134}, pages = {700--717}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40203-6\_39}, doi = {10.1007/978-3-642-40203-6\_39}, timestamp = {Fri, 29 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/ClarkMRSFX13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/ConchinhaBC13, author = {Bruno Conchinha and David A. Basin and Carlos Caleiro}, editor = {Jason Crampton and Sushil Jajodia and Keith Mayes}, title = {Symbolic Probabilistic Analysis of Off-Line Guessing}, booktitle = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8134}, pages = {363--380}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40203-6\_21}, doi = {10.1007/978-3-642-40203-6\_21}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/ConchinhaBC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/CrussellGC13, author = {Jonathan Crussell and Clint Gibler and Hao Chen}, editor = {Jason Crampton and Sushil Jajodia and Keith Mayes}, title = {AnDarwin: Scalable Detection of Semantically Similar Android Applications}, booktitle = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8134}, pages = {182--199}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40203-6\_11}, doi = {10.1007/978-3-642-40203-6\_11}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/CrussellGC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/CuvelierPP13, author = {Edouard Cuvelier and Olivier Pereira and Thomas Peters}, editor = {Jason Crampton and Sushil Jajodia and Keith Mayes}, title = {Election Verifiability or Ballot Privacy: Do We Need to Choose?}, booktitle = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8134}, pages = {481--498}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40203-6\_27}, doi = {10.1007/978-3-642-40203-6\_27}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/CuvelierPP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/DagdelenFGMMO13, author = {{\"{O}}zg{\"{u}}r Dagdelen and Marc Fischlin and Tommaso Gagliardoni and Giorgia Azzurra Marson and Arno Mittelbach and Cristina Onete}, editor = {Jason Crampton and Sushil Jajodia and Keith Mayes}, title = {A Cryptographic Analysis of {OPACITY} - (Extended Abstract)}, booktitle = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8134}, pages = {345--362}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40203-6\_20}, doi = {10.1007/978-3-642-40203-6\_20}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/DagdelenFGMMO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/DaiSL13, author = {Jun Dai and Xiaoyan Sun and Peng Liu}, editor = {Jason Crampton and Sushil Jajodia and Keith Mayes}, title = {Patrol: Revealing Zero-Day Attack Paths through Network-Wide System Object Dependencies}, booktitle = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8134}, pages = {536--555}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40203-6\_30}, doi = {10.1007/978-3-642-40203-6\_30}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/DaiSL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/DamgardKLPSS13, author = {Ivan Damg{\aa}rd and Marcel Keller and Enrique Larraia and Valerio Pastro and Peter Scholl and Nigel P. Smart}, editor = {Jason Crampton and Sushil Jajodia and Keith Mayes}, title = {Practical Covertly Secure {MPC} for Dishonest Majority - Or: Breaking the {SPDZ} Limits}, booktitle = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8134}, pages = {1--18}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40203-6\_1}, doi = {10.1007/978-3-642-40203-6\_1}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/DamgardKLPSS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/DengZX13, author = {Zhui Deng and Xiangyu Zhang and Dongyan Xu}, editor = {Jason Crampton and Sushil Jajodia and Keith Mayes}, title = {{BISTRO:} Binary Component Extraction and Embedding for Software Security Applications}, booktitle = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8134}, pages = {200--218}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40203-6\_12}, doi = {10.1007/978-3-642-40203-6\_12}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/DengZX13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/DongHSL13, author = {Xinshu Dong and Hong Hu and Prateek Saxena and Zhenkai Liang}, editor = {Jason Crampton and Sushil Jajodia and Keith Mayes}, title = {A Quantitative Evaluation of Privilege Separation in Web Browser Designs}, booktitle = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8134}, pages = {75--93}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40203-6\_5}, doi = {10.1007/978-3-642-40203-6\_5}, timestamp = {Thu, 15 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/DongHSL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/DongJP13, author = {Naipeng Dong and Hugo Jonker and Jun Pang}, editor = {Jason Crampton and Sushil Jajodia and Keith Mayes}, title = {Enforcing Privacy in the Presence of Others: Notions, Formalisations and Relations}, booktitle = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8134}, pages = {499--516}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40203-6\_28}, doi = {10.1007/978-3-642-40203-6\_28}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/DongJP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/Furukawa13, author = {Jun Furukawa}, editor = {Jason Crampton and Sushil Jajodia and Keith Mayes}, title = {Request-Based Comparable Encryption}, booktitle = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8134}, pages = {129--146}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40203-6\_8}, doi = {10.1007/978-3-642-40203-6\_8}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/Furukawa13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/GagneLL13, author = {Martin Gagn{\'{e}} and Pascal Lafourcade and Yassine Lakhnech}, editor = {Jason Crampton and Sushil Jajodia and Keith Mayes}, title = {Automated Security Proofs for Almost-Universal Hash for {MAC} Verification}, booktitle = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8134}, pages = {291--308}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40203-6\_17}, doi = {10.1007/978-3-642-40203-6\_17}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/GagneLL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/GiladH13, author = {Yossi Gilad and Amir Herzberg}, editor = {Jason Crampton and Sushil Jajodia and Keith Mayes}, title = {Plug-and-Play {IP} Security - Anonymity Infrastructure instead of {PKI}}, booktitle = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8134}, pages = {255--272}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40203-6\_15}, doi = {10.1007/978-3-642-40203-6\_15}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/GiladH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/GriesmayerM13, author = {Andreas Griesmayer and Charles Morisset}, editor = {Jason Crampton and Sushil Jajodia and Keith Mayes}, title = {Automated Certification of Authorisation Policy Resistance}, booktitle = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8134}, pages = {574--591}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40203-6\_32}, doi = {10.1007/978-3-642-40203-6\_32}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/GriesmayerM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/HerzbergS13, author = {Amir Herzberg and Haya Schulmann}, editor = {Jason Crampton and Sushil Jajodia and Keith Mayes}, title = {Vulnerable Delegation of {DNS} Resolution}, booktitle = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8134}, pages = {219--236}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40203-6\_13}, doi = {10.1007/978-3-642-40203-6\_13}, timestamp = {Tue, 17 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/HerzbergS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/HumbertSGH13, author = {Mathias Humbert and Th{\'{e}}ophile Studer and Matthias Grossglauser and Jean{-}Pierre Hubaux}, editor = {Jason Crampton and Sushil Jajodia and Keith Mayes}, title = {Nowhere to Hide: Navigating around Privacy in Online Social Networks}, booktitle = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8134}, pages = {682--699}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40203-6\_38}, doi = {10.1007/978-3-642-40203-6\_38}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/HumbertSGH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/JafarianAD13, author = {Jafar Haadi Jafarian and Ehab Al{-}Shaer and Qi Duan}, editor = {Jason Crampton and Sushil Jajodia and Keith Mayes}, title = {Formal Approach for Route Agility against Persistent Attackers}, booktitle = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8134}, pages = {237--254}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40203-6\_14}, doi = {10.1007/978-3-642-40203-6\_14}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/JafarianAD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/JeckmansPH13, author = {Arjan Jeckmans and Andreas Peter and Pieter H. Hartel}, editor = {Jason Crampton and Sushil Jajodia and Keith Mayes}, title = {Efficient Privacy-Enhanced Familiarity-Based Recommender System}, booktitle = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8134}, pages = {400--417}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40203-6\_23}, doi = {10.1007/978-3-642-40203-6\_23}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/JeckmansPH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/JiaAFBSFKM13, author = {Limin Jia and Jassim Aljuraidan and Elli Fragkaki and Lujo Bauer and Michael Stroucken and Kazuhide Fukushima and Shinsaku Kiyomoto and Yutaka Miyake}, editor = {Jason Crampton and Sushil Jajodia and Keith Mayes}, title = {Run-Time Enforcement of Information-Flow Properties on Android - (Extended Abstract)}, booktitle = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8134}, pages = {775--792}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40203-6\_43}, doi = {10.1007/978-3-642-40203-6\_43}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/JiaAFBSFKM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/KanovichKNS13, author = {Max I. Kanovich and Tajana Ban Kirigin and Vivek Nigam and Andre Scedrov}, editor = {Jason Crampton and Sushil Jajodia and Keith Mayes}, title = {Bounded Memory Protocols and Progressing Collaborative Systems}, booktitle = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8134}, pages = {309--326}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40203-6\_18}, doi = {10.1007/978-3-642-40203-6\_18}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/KanovichKNS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/KononchukELL13, author = {Dmitry Kononchuk and Zekeriya Erkin and Jan C. A. van der Lubbe and Reginald L. Lagendijk}, editor = {Jason Crampton and Sushil Jajodia and Keith Mayes}, title = {Privacy-Preserving User Data Oriented Services for Groups with Dynamic Participation}, booktitle = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8134}, pages = {418--442}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40203-6\_24}, doi = {10.1007/978-3-642-40203-6\_24}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/KononchukELL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/KremerKS13, author = {Steve Kremer and Robert K{\"{u}}nnemann and Graham Steel}, editor = {Jason Crampton and Sushil Jajodia and Keith Mayes}, title = {Universally Composable Key-Management}, booktitle = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8134}, pages = {327--344}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40203-6\_19}, doi = {10.1007/978-3-642-40203-6\_19}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/KremerKS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/LaszkaJSGB13, author = {Aron Laszka and Benjamin Johnson and Pascal Sch{\"{o}}ttle and Jens Grossklags and Rainer B{\"{o}}hme}, editor = {Jason Crampton and Sushil Jajodia and Keith Mayes}, title = {Managing the Weakest Link - {A} Game-Theoretic Approach for the Mitigation of Insider Threats}, booktitle = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8134}, pages = {273--290}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40203-6\_16}, doi = {10.1007/978-3-642-40203-6\_16}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/LaszkaJSGB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/LernerEPK13, author = {Benjamin S. Lerner and Liam Elberty and Neal Poole and Shriram Krishnamurthi}, editor = {Jason Crampton and Sushil Jajodia and Keith Mayes}, title = {Verifying Web Browser Extensions' Compliance with Private-Browsing Mode}, booktitle = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8134}, pages = {57--74}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40203-6\_4}, doi = {10.1007/978-3-642-40203-6\_4}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/LernerEPK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/Li0LJML13, author = {Jin Li and Xiaofeng Chen and Jingwei Li and Chunfu Jia and Jianfeng Ma and Wenjing Lou}, editor = {Jason Crampton and Sushil Jajodia and Keith Mayes}, title = {Fine-Grained Access Control System Based on Outsourced Attribute-Based Encryption}, booktitle = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8134}, pages = {592--609}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40203-6\_33}, doi = {10.1007/978-3-642-40203-6\_33}, timestamp = {Fri, 28 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/Li0LJML13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/MacedoT13, author = {Hugo Daniel Macedo and Tayssir Touili}, editor = {Jason Crampton and Sushil Jajodia and Keith Mayes}, title = {Mining Malware Specifications through Static Reachability Analysis}, booktitle = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8134}, pages = {517--535}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40203-6\_29}, doi = {10.1007/978-3-642-40203-6\_29}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/MacedoT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/MarsonP13, author = {Giorgia Azzurra Marson and Bertram Poettering}, editor = {Jason Crampton and Sushil Jajodia and Keith Mayes}, title = {Practical Secure Logging: Seekable Sequential Key Generators}, booktitle = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8134}, pages = {111--128}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40203-6\_7}, doi = {10.1007/978-3-642-40203-6\_7}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/MarsonP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/MishariGTO13, author = {Mishari Al Mishari and Paolo Gasti and Gene Tsudik and Ekin Oguz}, editor = {Jason Crampton and Sushil Jajodia and Keith Mayes}, title = {Privacy-Preserving Matching of Community-Contributed Content}, booktitle = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8134}, pages = {443--462}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40203-6\_25}, doi = {10.1007/978-3-642-40203-6\_25}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/MishariGTO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/OrenSW13, author = {Yossef Oren and Dvir Schirman and Avishai Wool}, editor = {Jason Crampton and Sushil Jajodia and Keith Mayes}, title = {Range Extension Attacks on Contactless Smart Cards}, booktitle = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8134}, pages = {646--663}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40203-6\_36}, doi = {10.1007/978-3-642-40203-6\_36}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/OrenSW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/ParkGG13, author = {Youngja Park and Christopher S. Gates and Stephen C. Gates}, editor = {Jason Crampton and Sushil Jajodia and Keith Mayes}, title = {Estimating Asset Sensitivity by Profiling Users}, booktitle = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8134}, pages = {94--110}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40203-6\_6}, doi = {10.1007/978-3-642-40203-6\_6}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/ParkGG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/SmythB13, author = {Ben Smyth and David Bernhard}, editor = {Jason Crampton and Sushil Jajodia and Keith Mayes}, title = {Ballot Secrecy and Ballot Independence Coincide}, booktitle = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8134}, pages = {463--480}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40203-6\_26}, doi = {10.1007/978-3-642-40203-6\_26}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/SmythB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/StefanBYLTRM13, author = {Deian Stefan and Pablo Buiras and Edward Z. Yang and Amit Levy and David Terei and Alejandro Russo and David Mazi{\`{e}}res}, editor = {Jason Crampton and Sushil Jajodia and Keith Mayes}, title = {Eliminating Cache-Based Timing Attacks with Instruction-Based Scheduling}, booktitle = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8134}, pages = {718--735}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40203-6\_40}, doi = {10.1007/978-3-642-40203-6\_40}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/StefanBYLTRM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/TschantzDW13, author = {Michael Carl Tschantz and Anupam Datta and Jeannette M. Wing}, editor = {Jason Crampton and Sushil Jajodia and Keith Mayes}, title = {Purpose Restrictions on Information Use}, booktitle = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8134}, pages = {610--627}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40203-6\_34}, doi = {10.1007/978-3-642-40203-6\_34}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/TschantzDW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/VadrevuRPLA13, author = {Phani Vadrevu and Babak Rahbarinia and Roberto Perdisci and Kang Li and Manos Antonakakis}, editor = {Jason Crampton and Sushil Jajodia and Keith Mayes}, title = {Measuring and Detecting Malware Downloads in Live Network Traffic}, booktitle = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8134}, pages = {556--573}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40203-6\_31}, doi = {10.1007/978-3-642-40203-6\_31}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/VadrevuRPLA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/VimercatiFPPS13, author = {Sabrina De Capitani di Vimercati and Sara Foresti and Stefano Paraboschi and Gerardo Pelosi and Pierangela Samarati}, editor = {Jason Crampton and Sushil Jajodia and Keith Mayes}, title = {Distributed Shuffling for Preserving Access Confidentiality}, booktitle = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8134}, pages = {628--645}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40203-6\_35}, doi = {10.1007/978-3-642-40203-6\_35}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/VimercatiFPPS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/WeiZP13, author = {Jinpeng Wei and Feng Zhu and Calton Pu}, editor = {Jason Crampton and Sushil Jajodia and Keith Mayes}, title = {KQguard: Binary-Centric Defense against Kernel Queue Injection Attacks}, booktitle = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8134}, pages = {755--774}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40203-6\_42}, doi = {10.1007/978-3-642-40203-6\_42}, timestamp = {Thu, 15 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/WeiZP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esorics/2013, editor = {Jason Crampton and Sushil Jajodia and Keith Mayes}, title = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8134}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40203-6}, doi = {10.1007/978-3-642-40203-6}, isbn = {978-3-642-40202-9}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.