The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ESORICS"( http://dblp.L3S.de/Venues/ESORICS )

URL (DBLP): http://dblp.uni-trier.de/db/conf/esorics

Publication years (Num. hits)
1990 (25) 1992 (25) 1994 (27) 1996 (24) 1998 (25) 2000 (20) 2002 (17) 2003 (20) 2004 (28) 2005 (29) 2006 (33) 2007 (41) 2008 (38) 2009 (43) 2010 (43) 2011 (37) 2012 (51) 2013 (44)
Publication types (Num. hits)
inproceedings(552) proceedings(18)
Venues (Conferences, Journals, ...)
ESORICS(570)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 311 occurrences of 214 keywords

Results
Found 570 publication records. Showing 570 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Joel Weinberger, Prateek Saxena, Devdatta Akhawe, Matthew Finifter, Eui Chul Richard Shin, Dawn Song A Systematic Analysis of XSS Sanitization in Web Application Frameworks. Search on Bibsonomy ESORICS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Ka Yang, Jinsheng Zhang, Wensheng Zhang 0001, Daji Qiao A Light-Weight Solution to Preservation of Access Pattern Privacy in Un-trusted Clouds. Search on Bibsonomy ESORICS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Jason Crampton Time-Storage Trade-Offs for Cryptographically-Enforced Access Control. Search on Bibsonomy ESORICS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Billy Bob Brumley, Nicola Tuveri Remote Timing Attacks Are Still Practical. Search on Bibsonomy ESORICS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Piero A. Bonatti, Marco Faella, Clemente Galdi, Luigi Sauro Towards a Mechanism for Incentivating Privacy. Search on Bibsonomy ESORICS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Raymond Mui, Phyllis G. Frankl Preventing Web Application Injections with Complementary Character Coding. Search on Bibsonomy ESORICS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Yuchen Zhou, David Evans 0001 Protecting Private Web Content from Embedded Scripts. Search on Bibsonomy ESORICS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Cas Cremers Key Exchange in IPsec Revisited: Formal Analysis of IKEv1 and IKEv2. Search on Bibsonomy ESORICS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Marina Blanton, Paolo Gasti Secure and Efficient Protocols for Iris and Fingerprint Identification. Search on Bibsonomy ESORICS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Jens Hermans, Andreas Pashalidis, Frederik Vercauteren, Bart Preneel A New RFID Privacy Model. Search on Bibsonomy ESORICS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Alexander Ulrich, Ralph Holz, Peter Hauck, Georg Carle Investigating the OpenPGP Web of Trust. Search on Bibsonomy ESORICS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Gerardo Pelosi, Pierangela Samarati Supporting Concurrency in Private Data Outsourcing. Search on Bibsonomy ESORICS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Yueqiang Cheng, Xuhua Ding, Robert H. Deng DriverGuard: A Fine-Grained Protection on I/O Flows. Search on Bibsonomy ESORICS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Diogo Mónica, Carlos Ribeiro WiFiHop - Mitigating the Evil Twin Attack through Multi-hop Detection. Search on Bibsonomy ESORICS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Massimiliano Albanese, Sushil Jajodia, Andrea Pugliese 0001, V. S. Subrahmanian Scalable Analysis of Attack Scenarios. Search on Bibsonomy ESORICS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1David Bernhard, Véronique Cortier, Olivier Pereira, Ben Smyth, Bogdan Warinschi Adapting Helios for Provable Ballot Privacy. Search on Bibsonomy ESORICS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Zhi Wang 0014, Jiang Ming 0002, Chunfu Jia, Debin Gao Linear Obfuscation to Combat Symbolic Execution. Search on Bibsonomy ESORICS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Dominique Schröder How to Aggregate the CL Signature Scheme. Search on Bibsonomy ESORICS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Nathan E. Rosenblum, Xiaojin Zhu 0001, Barton P. Miller Who Wrote This Code? Identifying the Authors of Program Binaries. Search on Bibsonomy ESORICS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Dang Vinh Pham, Joss Wright, Dogan Kesdogan A Practical Complexity-Theoretic Analysis of Mix Systems. Search on Bibsonomy ESORICS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Steve Barker, Valerio Genovese Socially Constructed Trust for Distributed Authorization. Search on Bibsonomy ESORICS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Christina Pöpper, Nils Ole Tippenhauer, Boris Danev, Srdjan Capkun Investigation of Signal and Message Manipulations on the Wireless Channel. Search on Bibsonomy ESORICS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Hannes Federrath, Karl-Peter Fuchs, Dominik Herrmann, Christopher Piosecny Privacy-Preserving DNS: Analysis of Broadcast, Range Queries and Mix-Based Protection Methods. Search on Bibsonomy ESORICS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Nicholas L. Farnan, Adam J. Lee, Panos K. Chrysanthis, Ting Yu 0001 Don't Reveal My Intension: Protecting User Privacy Using Declarative Preferences during Distributed Query Processing. Search on Bibsonomy ESORICS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Elie Bursztein, Baptiste Gourdin, John C. Mitchell Reclaiming the Blogosphere, TalkBack: A Secure LinkBack Protocol for Weblogs. Search on Bibsonomy ESORICS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Michele Boreale, Francesca Pampaloni, Michela Paolini Quantitative Information Flow, with a View. Search on Bibsonomy ESORICS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Philippe De Ryck, Lieven Desmet, Wouter Joosen, Frank Piessens Automatic and Precise Client-Side Protection against CSRF Attacks. Search on Bibsonomy ESORICS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Amir Herzberg, Ronen Margulies Forcing Johnny to Login Safely - Long-Term User Study of Forcing and Training Login Mechanisms. Search on Bibsonomy ESORICS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Alfred Kobsa, Rishab Nithyanand, Gene Tsudik, Ersin Uzun Usability of Display-Equipped RFID Tags for Security Purposes. Search on Bibsonomy ESORICS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Nashad Ahmed Safa, Saikat Sarkar 0003, Reihaneh Safavi-Naini, Majid Ghaderi Secure Localization Using Dynamic Verifiers. Search on Bibsonomy ESORICS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Murtuza Jadliwala, Igor Bilogrevic, Jean-Pierre Hubaux Optimizing Mixing in Pervasive Networks: A Graph-Theoretic Perspective. Search on Bibsonomy ESORICS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Arnar Birgisson, Andrei Sabelfeld Multi-run Security. Search on Bibsonomy ESORICS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Mikhail I. Gofman, Ruiqi Luo, Ping Yang 0002 User-Role Reachability Analysis of Evolving Administrative Role Based Access Control. Search on Bibsonomy ESORICS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Michael Backes 0001, Oana Ciobotaru, Anton Krohmer RatFish: A File Sharing Protocol Provably Secure against Rational Users. Search on Bibsonomy ESORICS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Alexandros Kapravelos, Iasonas Polakis, Elias Athanasopoulos, Sotiris Ioannidis, Evangelos P. Markatos D(e|i)aling with VoIP: Robust Prevention of DIAL Attacks. Search on Bibsonomy ESORICS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Jay Ligatti, Srikar Reddy A Theory of Runtime Enforcement, with Results. Search on Bibsonomy ESORICS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Joseph K. Liu, Man Ho Au, Willy Susilo, Jianying Zhou 0001 Short Generic Transformation to Strongly Unforgeable Signature in the Standard Model. Search on Bibsonomy ESORICS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Michael Backes 0001, Goran Doychev, Markus Dürmuth, Boris Köpf Speaker Recognition in Encrypted Voice Streams. Search on Bibsonomy ESORICS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1James Heather, Peter Y. A. Ryan, Vanessa Teague Pretty Good Democracy for More Expressive Voting Schemes. Search on Bibsonomy ESORICS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Nizar Kheir, Nora Cuppens-Boulahia, Frédéric Cuppens, Hervé Debar A Service Dependency Model for Cost-Sensitive Intrusion Response. Search on Bibsonomy ESORICS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1José Bacelar Almeida, Endre Bangerter, Manuel Barbosa, Stephan Krenn, Ahmad-Reza Sadeghi, Thomas Schneider 0003 A Certifying Compiler for Zero-Knowledge Proofs of Knowledge Based on Sigma-Protocols. Search on Bibsonomy ESORICS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Arnur G. Tokhtabayev, Victor A. Skormin, Andrey M. Dolgikh Expressive, Efficient and Obfuscation Resilient Behavior Based IDS. Search on Bibsonomy ESORICS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Wenjuan Xu, Gail-Joon Ahn, Hongxin Hu, Xinwen Zhang, Jean-Pierre Seifert DR@FT: Efficient Remote Attestation Framework for Dynamic Systems. Search on Bibsonomy ESORICS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Marina Blanton, Keith B. Frikken Efficient Multi-dimensional Key Management in Broadcast Services. Search on Bibsonomy ESORICS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Robert H. Deng, Yingjiu Li, Moti Yung, Yunlei Zhao A New Framework for RFID Privacy. Search on Bibsonomy ESORICS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Sven Heiberg, Helger Lipmaa, Filip van Laenen On E-Vote Integrity in the Case of Malicious Voter Computers. Search on Bibsonomy ESORICS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Elli Androulaki, Binh Vo, Steven M. Bellovin Privacy-Preserving, Taxable Bank Accounts. Search on Bibsonomy ESORICS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Jan Meier, Dieter Gollmann Caught in the Maze of Security Standards. Search on Bibsonomy ESORICS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Andreas Pashalidis, Stefan Schiffner Evaluating Adversarial Partitions. Search on Bibsonomy ESORICS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Xiapu Luo, Junjie Zhang 0004, Roberto Perdisci, Wenke Lee On the Secrecy of Spread-Spectrum Flow Watermarks. Search on Bibsonomy ESORICS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1David A. Basin, Cas Cremers Modeling and Analyzing Security in the Presence of Compromising Adversaries. Search on Bibsonomy ESORICS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Lingyu Wang 0001, Sushil Jajodia, Anoop Singhal, Steven Noel k-Zero Day Safety: Measuring the Security Risk of Networks against Unknown Attacks. Search on Bibsonomy ESORICS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Hirotoshi Yasuoka, Tachio Terauchi On Bounding Problems of Quantitative Information Flow. Search on Bibsonomy ESORICS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Ferucio Laurentiu Tiplea, Loredana Vamanu, Cosmin Vârlan Complexity of Anonymity for Security Protocols. Search on Bibsonomy ESORICS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Morten Dahl, Stéphanie Delaune, Graham Steel Formal Analysis of Privacy for Vehicular Mix-Zones. Search on Bibsonomy ESORICS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Hristo Bojinov, Elie Bursztein, Xavier Boyen, Dan Boneh Kamouflage: Loss-Resistant Password Management. Search on Bibsonomy ESORICS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Claudio A. Ardagna, Sushil Jajodia, Pierangela Samarati, Angelos Stavrou Providing Mobile Users' Anonymity in Hybrid Networks. Search on Bibsonomy ESORICS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Heiko Mantel, Henning Sudbrock Flexible Scheduler-Independent Security. Search on Bibsonomy ESORICS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Benjamin Johnson 0001, Jens Grossklags, Nicolas Christin, John Chuang Are Security Experts Useful? Bayesian Nash Equilibria for Network Security Games with Limited Information. Search on Bibsonomy ESORICS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Daniele Perito, Gene Tsudik Secure Code Update for Embedded Devices via Proofs of Secure Erasure. Search on Bibsonomy ESORICS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Laurent Hubert, Thomas P. Jensen, Vincent Monfort, David Pichardie Enforcing Secure Object Initialization in Java. Search on Bibsonomy ESORICS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Liming Lu, Ee-Chien Chang, Mun Choon Chan Website Fingerprinting and Identification Using Ordered Feature Sequences. Search on Bibsonomy ESORICS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Santiago Escobar 0001, Catherine Meadows 0001, José Meseguer 0001, Sonia Santiago Sequential Protocol Composition in Maude-NPA. Search on Bibsonomy ESORICS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Chao Zhang 0008, Tielei Wang, Tao Wei, Yu Chen, Wei Zou IntPatch: Automatically Fix Integer-Overflow-to-Buffer-Overflow Vulnerability at Compile-Time. Search on Bibsonomy ESORICS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Sambuddho Chakravarty, Angelos Stavrou, Angelos D. Keromytis Traffic Analysis against Low-Latency Anonymity Networks Using Available Bandwidth Estimation. Search on Bibsonomy ESORICS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Ghassan Karame, Srdjan Capkun Low-Cost Client Puzzles Based on Modular Exponentiation. Search on Bibsonomy ESORICS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Guang Xiang, Bryan A. Pendleton, Jason I. Hong, Carolyn P. Rosé A Hierarchical Adaptive Probabilistic Approach for Zero Hour Phish Detection. Search on Bibsonomy ESORICS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Tien Tuan Anh Dinh, Mark Ryan 0001 Verifying Security Property of Peer-to-Peer Systems Using CSP. Search on Bibsonomy ESORICS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Artur Janc, Lukasz Olejnik Web Browser History Detection as a Real-World Privacy Threat. Search on Bibsonomy ESORICS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Steve Kremer, Mark Ryan 0001, Ben Smyth Election Verifiability in Electronic Voting Protocols. Search on Bibsonomy ESORICS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Alptekin Küpçü, Anna Lysyanskaya Optimistic Fair Exchange with Multiple Arbiters. Search on Bibsonomy ESORICS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Rishab Nithyanand, Gene Tsudik, Ersin Uzun Readers Behaving Badly - Reader Revocation in PKI-Based RFID Systems. Search on Bibsonomy ESORICS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Dimitris Gritzalis, Bart Preneel, Marianthi Theoharidou (eds.) Computer Security - ESORICS 2010, 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings Search on Bibsonomy ESORICS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Octavian Catrina, Sebastiaan de Hoogh Secure Multiparty Linear Programming Using Fixed-Point Arithmetic. Search on Bibsonomy ESORICS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Jason Crampton, Michael Huth 0001 An Authorization Framework Resilient to Policy Evaluation Failures. Search on Bibsonomy ESORICS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Alexander Lux, Heiko Mantel Declassification with Explicit Reference Points. Search on Bibsonomy ESORICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Sebastian Mödersheim, Luca Viganò 0001 Secure Pseudonymous Channels. Search on Bibsonomy ESORICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Drew Davidson, Randy Smith, Nic Doyle, Somesh Jha Protocol Normalization Using Attribute Grammars. Search on Bibsonomy ESORICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Matteo Centenaro, Riccardo Focardi, Flaminia L. Luccio, Graham Steel Type-Based Analysis of PIN Processing APIs. Search on Bibsonomy ESORICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Mihhail Aizatulin, Henning Schnoor, Thomas Wilke Computationally Sound Analysis of a Probabilistic Contract Signing Protocol. Search on Bibsonomy ESORICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Nataliya Guts, Cédric Fournet, Francesco Zappa Nardelli Reliable Evidence: Auditability by Typing. Search on Bibsonomy ESORICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Radha Jagadeesan, Alan Jeffrey, Corin Pitcher, James Riely Towards a Theory of Accountability and Audit. Search on Bibsonomy ESORICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Rakeshbabu Bobba, Himanshu Khurana, Manoj Prabhakaran 0001 Attribute-Sets: A Practically Motivated Enhancement to Attribute-Based Encryption. Search on Bibsonomy ESORICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Avik Chaudhuri, Deepak Garg 0001 PCAL: Language Support for Proof-Carrying Authorization Systems. Search on Bibsonomy ESORICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Scott A. Crosby, Dan S. Wallach Super-Efficient Aggregating History-Independent Persistent Authenticated Dictionaries. Search on Bibsonomy ESORICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Mauro Barni, Pierluigi Failla, Vladimir Kolesnikov, Riccardo Lazzeretti, Ahmad-Reza Sadeghi, Thomas Schneider 0003 Secure Evaluation of Private Linear Branching Programs with Medical Applications. Search on Bibsonomy ESORICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Philip W. L. Fong, Mohd M. Anwar, Zhen Zhao A Privacy Preservation Model for Facebook-Style Social Network Systems. Search on Bibsonomy ESORICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Darrell Bethea, Michael K. Reiter Data Structures with Unpredictable Timing. Search on Bibsonomy ESORICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Alejandro Russo, Andrei Sabelfeld, Andrey Chudnov Tracking Information Flow in Dynamic Tree Structures. Search on Bibsonomy ESORICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1George Danezis, Claudia Díaz, Emilia Käsper, Carmela Troncoso The Wisdom of Crowds: Attacks and Optimal Constructions. Search on Bibsonomy ESORICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Fangqi Sun, Liang Xu, Zhendong Su 0001 Client-Side Detection of XSS Worms by Monitoring Payload Propagation. Search on Bibsonomy ESORICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF cross-site scripting worm, client-side detection, Web application security
1Cristian Ene, Yassine Lakhnech, Van Chan Ngo Formal Indistinguishability Extended to the Random Oracle Model. Search on Bibsonomy ESORICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Véronique Cortier, Graham Steel A Generic Security API for Symmetric Key Management on Cryptographic Devices. Search on Bibsonomy ESORICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Joachim Biskup, Christian Gogolin, Jens Seiler, Torben Weibert Requirements and Protocols for Inference-Proof Interactions in Information Systems. Search on Bibsonomy ESORICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Sipat Triukose, Zakaria Al-Qudah, Michael Rabinovich Content Delivery Networks: Protection or Threat? Search on Bibsonomy ESORICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Thorsten Holz, Markus Engelberth, Felix C. Freiling Learning More about the Underground Economy: A Case-Study of Keyloggers and Dropzones. Search on Bibsonomy ESORICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Michael Backes 0001, Peng Ning (eds.) Computer Security - ESORICS 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings Search on Bibsonomy ESORICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Zhi Wang 0004, Xuxian Jiang, Weidong Cui, Xinyuan Wang 0005, Mike Grace ReFormat: Automatic Reverse Engineering of Encrypted Messages. Search on Bibsonomy ESORICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Data Lifetime Analysis, Security, Reverse Engineering, Encryption, Network Protocols
1Daisuke Mashima, Mustaque Ahamad, Swagath Kannan User-Centric Handling of Identity Agent Compromise. Search on Bibsonomy ESORICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Sergio Maffeis, John C. Mitchell, Ankur Taly Isolating JavaScript with Filters, Rewriting, and Wrappers. Search on Bibsonomy ESORICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
Displaying result #101 - #200 of 570 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license