Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Bruno Conchinha, David A. Basin, Carlos Caleiro |
Symbolic Probabilistic Analysis of Off-Line Guessing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings, pp. 363-380, 2013, Springer, 978-3-642-40202-9. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Phani Vadrevu, Babak Rahbarinia, Roberto Perdisci, Kang Li 0001, Manos Antonakakis |
Measuring and Detecting Malware Downloads in Live Network Traffic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings, pp. 556-573, 2013, Springer, 978-3-642-40202-9. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Devdatta Akhawe, Frank Li 0001, Warren He, Prateek Saxena, Dawn Song |
Data-Confined HTML5 Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings, pp. 736-754, 2013, Springer, 978-3-642-40202-9. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Giorgia Azzurra Marson, Bertram Poettering |
Practical Secure Logging: Seekable Sequential Key Generators. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings, pp. 111-128, 2013, Springer, 978-3-642-40202-9. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Andreas Griesmayer, Charles Morisset |
Automated Certification of Authorisation Policy Resistance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings, pp. 574-591, 2013, Springer, 978-3-642-40202-9. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jin Li 0002, Xiaofeng Chen 0001, Jingwei Li 0001, Chunfu Jia, Jianfeng Ma 0001, Wenjing Lou |
Fine-Grained Access Control System Based on Outsourced Attribute-Based Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings, pp. 592-609, 2013, Springer, 978-3-642-40202-9. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Ben Smyth, David Bernhard |
Ballot Secrecy and Ballot Independence Coincide. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings, pp. 463-480, 2013, Springer, 978-3-642-40202-9. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Deian Stefan, Pablo Buiras, Edward Z. Yang, Amit Levy, David Terei, Alejandro Russo, David Mazières |
Eliminating Cache-Based Timing Attacks with Instruction-Based Scheduling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings, pp. 718-735, 2013, Springer, 978-3-642-40202-9. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Limin Jia 0001, Jassim Aljuraidan, Elli Fragkaki, Lujo Bauer, Michael Stroucken, Kazuhide Fukushima, Shinsaku Kiyomoto, Yutaka Miyake |
Run-Time Enforcement of Information-Flow Properties on Android - (Extended Abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings, pp. 775-792, 2013, Springer, 978-3-642-40202-9. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jonathan Crussell, Clint Gibler, Hao Chen 0003 |
AnDarwin: Scalable Detection of Semantically Similar Android Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings, pp. 182-199, 2013, Springer, 978-3-642-40202-9. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Aron Laszka, Benjamin Johnson 0001, Pascal Schöttle, Jens Grossklags, Rainer Böhme |
Managing the Weakest Link - A Game-Theoretic Approach for the Mitigation of Insider Threats. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings, pp. 273-290, 2013, Springer, 978-3-642-40202-9. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jun Dai, Xiaoyan Sun 0003, Peng Liu 0005 |
Patrol: Revealing Zero-Day Attack Paths through Network-Wide System Object Dependencies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings, pp. 536-555, 2013, Springer, 978-3-642-40202-9. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Youngja Park, Christopher S. Gates, Stephen C. Gates |
Estimating Asset Sensitivity by Profiling Users. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings, pp. 94-110, 2013, Springer, 978-3-642-40202-9. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Edouard Cuvelier, Olivier Pereira, Thomas Peters |
Election Verifiability or Ballot Privacy: Do We Need to Choose? ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings, pp. 481-498, 2013, Springer, 978-3-642-40202-9. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Mathias Humbert, Théophile Studer, Matthias Grossglauser, Jean-Pierre Hubaux |
Nowhere to Hide: Navigating around Privacy in Online Social Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings, pp. 682-699, 2013, Springer, 978-3-642-40202-9. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Zhui Deng, Xiangyu Zhang 0001, Dongyan Xu |
BISTRO: Binary Component Extraction and Embedding for Software Security Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings, pp. 200-218, 2013, Springer, 978-3-642-40202-9. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Steve Kremer, Robert Künnemann, Graham Steel |
Universally Composable Key-Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings, pp. 327-344, 2013, Springer, 978-3-642-40202-9. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Marco Valerio Barbera, Vasileios P. Kemerlis, Vasilis Pappas, Angelos D. Keromytis |
CellFlood: Attacking Tor Onion Routers on the Cheap. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings, pp. 664-681, 2013, Springer, 978-3-642-40202-9. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Gerardo Pelosi, Pierangela Samarati |
Distributed Shuffling for Preserving Access Confidentiality. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings, pp. 628-645, 2013, Springer, 978-3-642-40202-9. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Yossef Oren, Dvir Schirman, Avishai Wool |
Range Extension Attacks on Contactless Smart Cards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings, pp. 646-663, 2013, Springer, 978-3-642-40202-9. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jun Furukawa 0001 |
Request-Based Comparable Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings, pp. 129-146, 2013, Springer, 978-3-642-40202-9. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jinpeng Wei, Feng Zhu 0015, Calton Pu |
KQguard: Binary-Centric Defense against Kernel Queue Injection Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings, pp. 755-774, 2013, Springer, 978-3-642-40202-9. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Martin Gagné, Pascal Lafourcade 0001, Yassine Lakhnech |
Automated Security Proofs for Almost-Universal Hash for MAC Verification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings, pp. 291-308, 2013, Springer, 978-3-642-40202-9. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Özgür Dagdelen, Marc Fischlin, Tommaso Gagliardoni, Giorgia Azzurra Marson, Arno Mittelbach, Cristina Onete |
A Cryptographic Analysis of OPACITY - (Extended Abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings, pp. 345-362, 2013, Springer, 978-3-642-40202-9. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Dan Caselden, Alex Bazhanyuk, Mathias Payer, Stephen McCamant, Dawn Song |
HI-CFG: Construction by Binary Analysis and Application to Attack Polymorphism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings, pp. 164-181, 2013, Springer, 978-3-642-40202-9. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Dmitry Kononchuk, Zekeriya Erkin, Jan C. A. van der Lubbe, Reginald L. Lagendijk |
Privacy-Preserving User Data Oriented Services for Groups with Dynamic Participation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings, pp. 418-442, 2013, Springer, 978-3-642-40202-9. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Mishari Al Mishari, Paolo Gasti, Gene Tsudik, Ekin Oguz |
Privacy-Preserving Matching of Community-Contributed Content. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings, pp. 443-462, 2013, Springer, 978-3-642-40202-9. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jan Camenisch, Robert R. Enderlein, Victor Shoup |
Practical and Employable Protocols for UC-Secure Circuit Evaluation over ℤn. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings, pp. 19-37, 2013, Springer, 978-3-642-40202-9. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jason Crampton, Sushil Jajodia, Keith Mayes (eds.) |
Computer Security - ESORICS 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![Springer, 978-3-642-40202-9 The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jafar Haadi Jafarian, Ehab Al-Shaer, Qi Duan |
Formal Approach for Route Agility against Persistent Attackers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings, pp. 237-254, 2013, Springer, 978-3-642-40202-9. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Hugo Daniel Macedo, Tayssir Touili |
Mining Malware Specifications through Static Reachability Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings, pp. 517-535, 2013, Springer, 978-3-642-40202-9. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Michael Backes 0001, Dario Fiore 0001, Esfandiar Mohammadi |
Privacy-Preserving Accountable Computation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings, pp. 38-56, 2013, Springer, 978-3-642-40202-9. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Xinshu Dong, Hong Hu 0004, Prateek Saxena, Zhenkai Liang |
A Quantitative Evaluation of Privilege Separation in Web Browser Designs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings, pp. 75-93, 2013, Springer, 978-3-642-40202-9. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Lei Wei 0004, Michael K. Reiter |
Ensuring File Authenticity in Private DFA Evaluation on Encrypted Files in the Cloud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings, pp. 147-163, 2013, Springer, 978-3-642-40202-9. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Benjamin S. Lerner, Liam Elberty, Neal Poole, Shriram Krishnamurthi |
Verifying Web Browser Extensions' Compliance with Private-Browsing Mode. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings, pp. 57-74, 2013, Springer, 978-3-642-40202-9. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Ivan Damgård, Marcel Keller, Enrique Larraia, Valerio Pastro, Peter Scholl, Nigel P. Smart |
Practical Covertly Secure MPC for Dishonest Majority - Or: Breaking the SPDZ Limits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings, pp. 1-18, 2013, Springer, 978-3-642-40202-9. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Amir Herzberg, Haya Schulmann |
Vulnerable Delegation of DNS Resolution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings, pp. 219-236, 2013, Springer, 978-3-642-40202-9. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Naipeng Dong, Hugo Jonker, Jun Pang 0001 |
Enforcing Privacy in the Presence of Others: Notions, Formalisations and Relations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings, pp. 499-516, 2013, Springer, 978-3-642-40202-9. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Arjan Jeckmans, Andreas Peter, Pieter H. Hartel |
Efficient Privacy-Enhanced Familiarity-Based Recommender System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings, pp. 400-417, 2013, Springer, 978-3-642-40202-9. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Yossi Gilad, Amir Herzberg |
Plug-and-Play IP Security - Anonymity Infrastructure instead of PKI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings, pp. 255-272, 2013, Springer, 978-3-642-40202-9. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Max I. Kanovich, Tajana Ban Kirigin, Vivek Nigam, Andre Scedrov |
Bounded Memory Protocols and Progressing Collaborative Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings, pp. 309-326, 2013, Springer, 978-3-642-40202-9. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Michael Carl Tschantz, Anupam Datta, Jeannette M. Wing |
Purpose Restrictions on Information Use. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings, pp. 610-627, 2013, Springer, 978-3-642-40202-9. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Colin Boyd, Cas Cremers, Michèle Feltz, Kenneth G. Paterson, Bertram Poettering, Douglas Stebila |
ASICS: Authenticated Key Exchange Security Incorporating Certification Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings, pp. 381-399, 2013, Springer, 978-3-642-40202-9. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Shane S. Clark, Hossen Asiful Mustafa, Benjamin Ransford, Jacob Sorber, Kevin Fu, Wenyuan Xu 0001 |
Current Events: Identifying Webpages by Tapping the Electrical Outlet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings, pp. 700-717, 2013, Springer, 978-3-642-40202-9. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Arnar Birgisson, Daniel Hedin, Andrei Sabelfeld |
Boosting the Permissiveness of Dynamic Information-Flow Tracking by Testing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings, pp. 55-72, 2012, Springer, 978-3-642-33166-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Jinkyu Koo, Xiaojun Lin 0001, Saurabh Bagchi |
PRIVATUS: Wallet-Friendly Privacy Protection for Smart Meters. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings, pp. 343-360, 2012, Springer, 978-3-642-33166-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Henning Schnoor |
Deciding Epistemic and Strategic Properties of Cryptographic Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings, pp. 91-108, 2012, Springer, 978-3-642-33166-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Aanjhan Ranganathan, Nils Ole Tippenhauer, Boris Skoric, Dave Singelée, Srdjan Capkun |
Design and Implementation of a Terrorist Fraud Resilient Distance Bounding System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings, pp. 415-432, 2012, Springer, 978-3-642-33166-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Flavio D. Garcia, Gerhard de Koning Gans, Roel Verdult, Milosch Meriac |
Dismantling iClass and iClass Elite. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings, pp. 697-715, 2012, Springer, 978-3-642-33166-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Mishari Al Mishari, Gene Tsudik |
Exploring Linkability of User Reviews. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings, pp. 307-324, 2012, Springer, 978-3-642-33166-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Alex Biryukov, Ivan Pustogarov, Ralf-Philipp Weinmann |
TorScan: Tracing Long-Lived Connections and Differential Scanning Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings, pp. 469-486, 2012, Springer, 978-3-642-33166-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Ruben Rios, Jorge Cuéllar, Javier López 0001 |
Robust Probabilistic Fake Packet Injection for Receiver-Location Privacy in WSN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings, pp. 163-180, 2012, Springer, 978-3-642-33166-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Naipeng Dong, Hugo Jonker, Jun Pang 0001 |
Formal Analysis of Privacy in an eHealth Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings, pp. 325-342, 2012, Springer, 978-3-642-33166-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Serdar Erbatur, Santiago Escobar 0001, Deepak Kapur, Zhiqiang Liu, Christopher Lynch, Catherine Meadows 0001, José Meseguer 0001, Paliath Narendran, Sonia Santiago, Ralf Sasse |
Effective Symbolic Protocol Analysis via Equational Irreducibility Conditions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings, pp. 73-90, 2012, Springer, 978-3-642-33166-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Yvo Desmedt, Pyrros Chaidos |
Applying Divertibility to Blind Ballot Copying in the Helios Internet Voting System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings, pp. 433-450, 2012, Springer, 978-3-642-33166-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Jannik Dreier, Pascal Lafourcade 0001, Yassine Lakhnech |
Defining Privacy for Weighted Votes, Single and Multi-voter Coercion. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings, pp. 451-468, 2012, Springer, 978-3-642-33166-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Simon Eberz, Martin Strohmeier, Matthias Wilhelm 0001, Ivan Martinovic |
A Practical Man-In-The-Middle Attack on Signal-Based Key Generation Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings, pp. 235-252, 2012, Springer, 978-3-642-33166-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Markus Dürmuth, Tim Güneysu, Markus Kasper, Christof Paar, Tolga Yalçin, Ralf Zimmermann 0001 |
Evaluation of Standardized Password-Based Key Derivation against Parallel Processing Platforms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings, pp. 716-733, 2012, Springer, 978-3-642-33166-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Naveed Ahmed 0005, Christian Damsgaard Jensen, Erik Zenner |
Towards Symbolic Encryption Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings, pp. 557-572, 2012, Springer, 978-3-642-33166-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Daisuke Moriyama, Shin'ichiro Matsuo, Miyako Ohkubo |
Relations among Notions of Privacy for RFID Authentication Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings, pp. 661-678, 2012, Springer, 978-3-642-33166-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Marina Blanton, Mikhail J. Atallah, Keith B. Frikken, Qutaibah M. Malluhi |
Secure and Efficient Outsourcing of Sequence Comparisons. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings, pp. 505-522, 2012, Springer, 978-3-642-33166-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Yongzheng Wu, Sai Sathyanarayan, Roland H. C. Yap, Zhenkai Liang |
Codejail: Application-Transparent Isolation of Libraries with Tight Program Interactions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings, pp. 859-876, 2012, Springer, 978-3-642-33166-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | James Kelley, Roberto Tamassia, Nikos Triandopoulos |
Hardening Access Control and Data Protection in GFS-like File Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings, pp. 19-36, 2012, Springer, 978-3-642-33166-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Kin Ying Yu, Tsz Hon Yuen, Sherman S. M. Chow, Siu-Ming Yiu, Lucas Chi Kwong Hui |
PE(AR)2: Privacy-Enhanced Anonymous Authentication with Reputation and Revocation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings, pp. 679-696, 2012, Springer, 978-3-642-33166-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Arif Akram Khan, Philip W. L. Fong |
Satisfiability and Feasibility in a Relationship-Based Workflow Authorization Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings, pp. 109-126, 2012, Springer, 978-3-642-33166-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Tzipora Halevi, Di Ma, Nitesh Saxena, Tuo Xiang |
Secure Proximity Detection for NFC Devices Based on Ambient Sensor Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings, pp. 379-396, 2012, Springer, 978-3-642-33166-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Mengtao Sun, Gang Tan |
JVM-Portable Sandboxing of Java's Native Libraries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings, pp. 842-858, 2012, Springer, 978-3-642-33166-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Elli Fragkaki, Lujo Bauer, Limin Jia 0001, David Swasey |
Modeling and Enhancing Android's Permission System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings, pp. 1-18, 2012, Springer, 978-3-642-33166-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Adam J. Aviv, Micah Sherr, Matt Blaze, Jonathan M. Smith |
Privacy-Aware Message Exchanges for Geographically Routed Human Movement Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings, pp. 181-198, 2012, Springer, 978-3-642-33166-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Xiaofeng Chen 0001, Jin Li 0002, Jianfeng Ma 0001, Qiang Tang 0001, Wenjing Lou |
New Algorithms for Secure Outsourcing of Modular Exponentiations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings, pp. 541-556, 2012, Springer, 978-3-642-33166-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Philippe Beaucamps, Isabelle Gnaedig, Jean-Yves Marion |
Abstraction-Based Malware Analysis Using Rewriting and Model Checking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings, pp. 806-823, 2012, Springer, 978-3-642-33166-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Qijun Gu, Kyle Jones, Wanyu Zang, Meng Yu 0001, Peng Liu 0005 |
Revealing Abuses of Channel Assignment Protocols in Multi-channel Wireless Networks: An Investigation Logic Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings, pp. 289-306, 2012, Springer, 978-3-642-33166-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Yao Zheng, Ming Li 0003, Wenjing Lou, Y. Thomas Hou 0001 |
SHARP: Private Proximity Test and Secure Handshake with Cheat-Proof Location Tags. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings, pp. 361-378, 2012, Springer, 978-3-642-33166-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Ziming Zhao 0001, Gail-Joon Ahn, Hongxin Hu, Deepinder Mahi |
SocialImpact: Systematic Analysis of Underground Social Dynamics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings, pp. 877-894, 2012, Springer, 978-3-642-33166-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Ahmad-Reza Sadeghi, Steffen Schulz 0001, Vijay Varadharajan |
The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings, pp. 253-270, 2012, Springer, 978-3-642-33166-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Tibor Jager, Sebastian Schinzel, Juraj Somorovsky |
Bleichenbacher's Attack Strikes again: Breaking PKCS#1 v1.5 in XML Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings, pp. 752-769, 2012, Springer, 978-3-642-33166-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Italo Dacosta, Mustaque Ahamad, Patrick Traynor |
Trust No One Else: Detecting MITM Attacks against SSL/TLS without Third-Parties. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings, pp. 199-216, 2012, Springer, 978-3-642-33166-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Amir Herzberg, Haya Schulmann |
Security of Patched DNS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings, pp. 271-288, 2012, Springer, 978-3-642-33166-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Fuchun Guo, Yi Mu 0001, Willy Susilo |
Identity-Based Traitor Tracing with Short Private Key and Short Ciphertext. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings, pp. 609-626, 2012, Springer, 978-3-642-33166-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Rakesh M. Verma, Narasimha K. Shashidhar, Nabil Hossain |
Detecting Phishing Emails the Natural Language Way. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings, pp. 824-841, 2012, Springer, 978-3-642-33166-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Lei Wei 0004, Michael K. Reiter |
Third-Party Private DFA Evaluation on Encrypted Files in the Cloud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings, pp. 523-540, 2012, Springer, 978-3-642-33166-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Cas Cremers, Michèle Feltz |
Beyond eCK: Perfect Forward Secrecy under Actor Compromise and Ephemeral-Key Reveal. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings, pp. 734-751, 2012, Springer, 978-3-642-33166-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Jack W. Stokes, John C. Platt, Helen J. Wang, Joe Faulhaber, Jonathan Keller, Mady Marinescu, Anil Thomas, Marius Gheorghescu |
Scalable Telemetry Classification for Automated Malware Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings, pp. 788-805, 2012, Springer, 978-3-642-33166-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Karl-Peter Fuchs, Dominik Herrmann, Hannes Federrath |
Introducing the gMix Open Source Framework for Mix Implementations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings, pp. 487-504, 2012, Springer, 978-3-642-33166-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Jonathan Crussell, Clint Gibler, Hao Chen 0003 |
Attack of the Clones: Detecting Cloned Applications on Android Markets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings, pp. 37-54, 2012, Springer, 978-3-642-33166-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Joseph K. Liu, Man Ho Au, Willy Susilo, Jianying Zhou 0001 |
Enhancing Location Privacy for Electric Vehicles (at the Right time). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings, pp. 397-414, 2012, Springer, 978-3-642-33166-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Sara Foresti, Moti Yung, Fabio Martinelli (eds.) |
Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![Springer, 978-3-642-33166-4 The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Massimiliano Albanese, Alessandra De Benedictis, Sushil Jajodia, Paulo Shakarian |
A Probabilistic Framework for Localization of Attackers in MANETs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings, pp. 145-162, 2012, Springer, 978-3-642-33166-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Paolo Gasti, Kasper Bonne Rasmussen |
On the Security of Password Manager Database Formats. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings, pp. 770-787, 2012, Springer, 978-3-642-33166-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Charanjit S. Jutla, Arnab Roy 0001 |
Decision Procedures for Simulatability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings, pp. 573-590, 2012, Springer, 978-3-642-33166-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Deepak D'Souza, K. R. Raghavendra |
Model-Checking Bisimulation-Based Information Flow Properties for Infinite State Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings, pp. 591-608, 2012, Springer, 978-3-642-33166-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Sebastian Mödersheim |
Deciding Security for a Fragment of ASLan. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings, pp. 127-144, 2012, Springer, 978-3-642-33166-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Matthew K. Franklin, Haibin Zhang |
Unique Group Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings, pp. 643-660, 2012, Springer, 978-3-642-33166-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Ralph Holz, Thomas Riedmaier, Nils Kammenhuber, Georg Carle |
X.509 Forensics: Detecting and Localising the SSL/TLS Men-in-the-Middle. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings, pp. 217-234, 2012, Springer, 978-3-642-33166-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | David Galindo, Javier Herranz, Jorge L. Villar |
Identity-Based Encryption with Master Key-Dependent Message Security and Leakage-Resilience. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings, pp. 627-642, 2012, Springer, 978-3-642-33166-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Xiao-yong Zhou, Bo Peng, Yong Fuga Li, Yangyi Chen, Haixu Tang, XiaoFeng Wang 0001 |
To Release or Not to Release: Evaluating Information Leaks in Aggregate Human-Genome Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2011 - 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings, pp. 607-627, 2011, Springer, 978-3-642-23821-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Sören Bleikertz, Thomas Groß 0001, Matthias Schunter, Konrad Eriksson |
Automated Information Flow Analysis of Virtualized Infrastructures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2011 - 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings, pp. 392-415, 2011, Springer, 978-3-642-23821-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Gunnar Kreitz |
Timing Is Everything: The Importance of History Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2011 - 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings, pp. 117-132, 2011, Springer, 978-3-642-23821-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Vijay Atluri, Claudia Díaz (eds.) |
Computer Security - ESORICS 2011 - 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![Springer, 978-3-642-23821-5 The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Zhen Liu 0008, Zhenfu Cao, Qiong Huang 0001, Duncan S. Wong, Tsz Hon Yuen |
Fully Secure Multi-authority Ciphertext-Policy Attribute-Based Encryption without Random Oracles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2011 - 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings, pp. 278-297, 2011, Springer, 978-3-642-23821-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|