Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Joel Weinberger, Prateek Saxena, Devdatta Akhawe, Matthew Finifter, Eui Chul Richard Shin, Dawn Song |
A Systematic Analysis of XSS Sanitization in Web Application Frameworks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2011 - 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings, pp. 150-171, 2011, Springer, 978-3-642-23821-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Ka Yang, Jinsheng Zhang, Wensheng Zhang 0001, Daji Qiao |
A Light-Weight Solution to Preservation of Access Pattern Privacy in Un-trusted Clouds. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2011 - 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings, pp. 528-547, 2011, Springer, 978-3-642-23821-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Jason Crampton |
Time-Storage Trade-Offs for Cryptographically-Enforced Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2011 - 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings, pp. 245-261, 2011, Springer, 978-3-642-23821-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Billy Bob Brumley, Nicola Tuveri |
Remote Timing Attacks Are Still Practical. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2011 - 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings, pp. 355-371, 2011, Springer, 978-3-642-23821-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Piero A. Bonatti, Marco Faella, Clemente Galdi, Luigi Sauro |
Towards a Mechanism for Incentivating Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2011 - 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings, pp. 472-488, 2011, Springer, 978-3-642-23821-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Raymond Mui, Phyllis G. Frankl |
Preventing Web Application Injections with Complementary Character Coding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2011 - 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings, pp. 80-99, 2011, Springer, 978-3-642-23821-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Yuchen Zhou, David Evans 0001 |
Protecting Private Web Content from Embedded Scripts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2011 - 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings, pp. 60-79, 2011, Springer, 978-3-642-23821-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Cas Cremers |
Key Exchange in IPsec Revisited: Formal Analysis of IKEv1 and IKEv2. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2011 - 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings, pp. 315-334, 2011, Springer, 978-3-642-23821-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Marina Blanton, Paolo Gasti |
Secure and Efficient Protocols for Iris and Fingerprint Identification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2011 - 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings, pp. 190-209, 2011, Springer, 978-3-642-23821-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Jens Hermans, Andreas Pashalidis, Frederik Vercauteren, Bart Preneel |
A New RFID Privacy Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2011 - 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings, pp. 568-587, 2011, Springer, 978-3-642-23821-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Alexander Ulrich, Ralph Holz, Peter Hauck, Georg Carle |
Investigating the OpenPGP Web of Trust. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2011 - 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings, pp. 489-507, 2011, Springer, 978-3-642-23821-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Gerardo Pelosi, Pierangela Samarati |
Supporting Concurrency in Private Data Outsourcing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2011 - 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings, pp. 648-664, 2011, Springer, 978-3-642-23821-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Yueqiang Cheng, Xuhua Ding, Robert H. Deng |
DriverGuard: A Fine-Grained Protection on I/O Flows. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2011 - 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings, pp. 227-244, 2011, Springer, 978-3-642-23821-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Diogo Mónica, Carlos Ribeiro |
WiFiHop - Mitigating the Evil Twin Attack through Multi-hop Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2011 - 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings, pp. 21-39, 2011, Springer, 978-3-642-23821-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Massimiliano Albanese, Sushil Jajodia, Andrea Pugliese 0001, V. S. Subrahmanian |
Scalable Analysis of Attack Scenarios. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2011 - 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings, pp. 416-433, 2011, Springer, 978-3-642-23821-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | David Bernhard, Véronique Cortier, Olivier Pereira, Ben Smyth, Bogdan Warinschi |
Adapting Helios for Provable Ballot Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2011 - 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings, pp. 335-354, 2011, Springer, 978-3-642-23821-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Zhi Wang 0014, Jiang Ming 0002, Chunfu Jia, Debin Gao |
Linear Obfuscation to Combat Symbolic Execution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2011 - 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings, pp. 210-226, 2011, Springer, 978-3-642-23821-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Dominique Schröder |
How to Aggregate the CL Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2011 - 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings, pp. 298-314, 2011, Springer, 978-3-642-23821-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Nathan E. Rosenblum, Xiaojin Zhu 0001, Barton P. Miller |
Who Wrote This Code? Identifying the Authors of Program Binaries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2011 - 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings, pp. 172-189, 2011, Springer, 978-3-642-23821-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Dang Vinh Pham, Joss Wright, Dogan Kesdogan |
A Practical Complexity-Theoretic Analysis of Mix Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2011 - 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings, pp. 508-527, 2011, Springer, 978-3-642-23821-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Steve Barker, Valerio Genovese |
Socially Constructed Trust for Distributed Authorization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2011 - 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings, pp. 262-277, 2011, Springer, 978-3-642-23821-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Christina Pöpper, Nils Ole Tippenhauer, Boris Danev, Srdjan Capkun |
Investigation of Signal and Message Manipulations on the Wireless Channel. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2011 - 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings, pp. 40-59, 2011, Springer, 978-3-642-23821-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Hannes Federrath, Karl-Peter Fuchs, Dominik Herrmann, Christopher Piosecny |
Privacy-Preserving DNS: Analysis of Broadcast, Range Queries and Mix-Based Protection Methods. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2011 - 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings, pp. 665-683, 2011, Springer, 978-3-642-23821-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Nicholas L. Farnan, Adam J. Lee, Panos K. Chrysanthis, Ting Yu 0001 |
Don't Reveal My Intension: Protecting User Privacy Using Declarative Preferences during Distributed Query Processing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2011 - 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings, pp. 628-647, 2011, Springer, 978-3-642-23821-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Elie Bursztein, Baptiste Gourdin, John C. Mitchell |
Reclaiming the Blogosphere, TalkBack: A Secure LinkBack Protocol for Weblogs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2011 - 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings, pp. 133-149, 2011, Springer, 978-3-642-23821-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Michele Boreale, Francesca Pampaloni, Michela Paolini |
Quantitative Information Flow, with a View. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2011 - 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings, pp. 588-606, 2011, Springer, 978-3-642-23821-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Philippe De Ryck, Lieven Desmet, Wouter Joosen, Frank Piessens |
Automatic and Precise Client-Side Protection against CSRF Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2011 - 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings, pp. 100-116, 2011, Springer, 978-3-642-23821-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Amir Herzberg, Ronen Margulies |
Forcing Johnny to Login Safely - Long-Term User Study of Forcing and Training Login Mechanisms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2011 - 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings, pp. 452-471, 2011, Springer, 978-3-642-23821-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Alfred Kobsa, Rishab Nithyanand, Gene Tsudik, Ersin Uzun |
Usability of Display-Equipped RFID Tags for Security Purposes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2011 - 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings, pp. 434-451, 2011, Springer, 978-3-642-23821-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Nashad Ahmed Safa, Saikat Sarkar 0003, Reihaneh Safavi-Naini, Majid Ghaderi |
Secure Localization Using Dynamic Verifiers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2011 - 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings, pp. 1-20, 2011, Springer, 978-3-642-23821-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Murtuza Jadliwala, Igor Bilogrevic, Jean-Pierre Hubaux |
Optimizing Mixing in Pervasive Networks: A Graph-Theoretic Perspective. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2011 - 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings, pp. 548-567, 2011, Springer, 978-3-642-23821-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Arnar Birgisson, Andrei Sabelfeld |
Multi-run Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2011 - 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings, pp. 372-391, 2011, Springer, 978-3-642-23821-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Mikhail I. Gofman, Ruiqi Luo, Ping Yang 0002 |
User-Role Reachability Analysis of Evolving Administrative Role Based Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2010, 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings, pp. 455-471, 2010, Springer, 978-3-642-15496-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Michael Backes 0001, Oana Ciobotaru, Anton Krohmer |
RatFish: A File Sharing Protocol Provably Secure against Rational Users. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2010, 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings, pp. 607-625, 2010, Springer, 978-3-642-15496-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Alexandros Kapravelos, Iasonas Polakis, Elias Athanasopoulos, Sotiris Ioannidis, Evangelos P. Markatos |
D(e|i)aling with VoIP: Robust Prevention of DIAL Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2010, 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings, pp. 663-678, 2010, Springer, 978-3-642-15496-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Jay Ligatti, Srikar Reddy |
A Theory of Runtime Enforcement, with Results. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2010, 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings, pp. 87-100, 2010, Springer, 978-3-642-15496-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Joseph K. Liu, Man Ho Au, Willy Susilo, Jianying Zhou 0001 |
Short Generic Transformation to Strongly Unforgeable Signature in the Standard Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2010, 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings, pp. 168-181, 2010, Springer, 978-3-642-15496-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Michael Backes 0001, Goran Doychev, Markus Dürmuth, Boris Köpf |
Speaker Recognition in Encrypted Voice Streams. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2010, 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings, pp. 508-523, 2010, Springer, 978-3-642-15496-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | James Heather, Peter Y. A. Ryan, Vanessa Teague |
Pretty Good Democracy for More Expressive Voting Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2010, 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings, pp. 405-423, 2010, Springer, 978-3-642-15496-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Nizar Kheir, Nora Cuppens-Boulahia, Frédéric Cuppens, Hervé Debar |
A Service Dependency Model for Cost-Sensitive Intrusion Response. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2010, 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings, pp. 626-642, 2010, Springer, 978-3-642-15496-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | José Bacelar Almeida, Endre Bangerter, Manuel Barbosa, Stephan Krenn, Ahmad-Reza Sadeghi, Thomas Schneider 0003 |
A Certifying Compiler for Zero-Knowledge Proofs of Knowledge Based on Sigma-Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2010, 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings, pp. 151-167, 2010, Springer, 978-3-642-15496-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Arnur G. Tokhtabayev, Victor A. Skormin, Andrey M. Dolgikh |
Expressive, Efficient and Obfuscation Resilient Behavior Based IDS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2010, 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings, pp. 698-715, 2010, Springer, 978-3-642-15496-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Wenjuan Xu, Gail-Joon Ahn, Hongxin Hu, Xinwen Zhang, Jean-Pierre Seifert |
DR@FT: Efficient Remote Attestation Framework for Dynamic Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2010, 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings, pp. 182-198, 2010, Springer, 978-3-642-15496-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Marina Blanton, Keith B. Frikken |
Efficient Multi-dimensional Key Management in Broadcast Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2010, 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings, pp. 424-440, 2010, Springer, 978-3-642-15496-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Robert H. Deng, Yingjiu Li, Moti Yung, Yunlei Zhao |
A New Framework for RFID Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2010, 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings, pp. 1-18, 2010, Springer, 978-3-642-15496-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Sven Heiberg, Helger Lipmaa, Filip van Laenen |
On E-Vote Integrity in the Case of Malicious Voter Computers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2010, 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings, pp. 373-388, 2010, Springer, 978-3-642-15496-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Elli Androulaki, Binh Vo, Steven M. Bellovin |
Privacy-Preserving, Taxable Bank Accounts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2010, 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings, pp. 37-54, 2010, Springer, 978-3-642-15496-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Jan Meier, Dieter Gollmann |
Caught in the Maze of Security Standards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2010, 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings, pp. 441-454, 2010, Springer, 978-3-642-15496-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Andreas Pashalidis, Stefan Schiffner |
Evaluating Adversarial Partitions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2010, 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings, pp. 524-539, 2010, Springer, 978-3-642-15496-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Xiapu Luo, Junjie Zhang 0004, Roberto Perdisci, Wenke Lee |
On the Secrecy of Spread-Spectrum Flow Watermarks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2010, 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings, pp. 232-248, 2010, Springer, 978-3-642-15496-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | David A. Basin, Cas Cremers |
Modeling and Analyzing Security in the Presence of Compromising Adversaries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2010, 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings, pp. 340-356, 2010, Springer, 978-3-642-15496-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Lingyu Wang 0001, Sushil Jajodia, Anoop Singhal, Steven Noel |
k-Zero Day Safety: Measuring the Security Risk of Networks against Unknown Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2010, 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings, pp. 573-587, 2010, Springer, 978-3-642-15496-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Hirotoshi Yasuoka, Tachio Terauchi |
On Bounding Problems of Quantitative Information Flow. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2010, 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings, pp. 357-372, 2010, Springer, 978-3-642-15496-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Ferucio Laurentiu Tiplea, Loredana Vamanu, Cosmin Vârlan |
Complexity of Anonymity for Security Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2010, 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings, pp. 558-572, 2010, Springer, 978-3-642-15496-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Morten Dahl, Stéphanie Delaune, Graham Steel |
Formal Analysis of Privacy for Vehicular Mix-Zones. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2010, 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings, pp. 55-70, 2010, Springer, 978-3-642-15496-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Hristo Bojinov, Elie Bursztein, Xavier Boyen, Dan Boneh |
Kamouflage: Loss-Resistant Password Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2010, 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings, pp. 286-302, 2010, Springer, 978-3-642-15496-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Claudio A. Ardagna, Sushil Jajodia, Pierangela Samarati, Angelos Stavrou |
Providing Mobile Users' Anonymity in Hybrid Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2010, 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings, pp. 540-557, 2010, Springer, 978-3-642-15496-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Heiko Mantel, Henning Sudbrock |
Flexible Scheduler-Independent Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2010, 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings, pp. 116-133, 2010, Springer, 978-3-642-15496-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Benjamin Johnson 0001, Jens Grossklags, Nicolas Christin, John Chuang |
Are Security Experts Useful? Bayesian Nash Equilibria for Network Security Games with Limited Information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2010, 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings, pp. 588-606, 2010, Springer, 978-3-642-15496-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Daniele Perito, Gene Tsudik |
Secure Code Update for Embedded Devices via Proofs of Secure Erasure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2010, 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings, pp. 643-662, 2010, Springer, 978-3-642-15496-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Laurent Hubert, Thomas P. Jensen, Vincent Monfort, David Pichardie |
Enforcing Secure Object Initialization in Java. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2010, 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings, pp. 101-115, 2010, Springer, 978-3-642-15496-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Liming Lu, Ee-Chien Chang, Mun Choon Chan |
Website Fingerprinting and Identification Using Ordered Feature Sequences. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2010, 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings, pp. 199-214, 2010, Springer, 978-3-642-15496-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Santiago Escobar 0001, Catherine Meadows 0001, José Meseguer 0001, Sonia Santiago |
Sequential Protocol Composition in Maude-NPA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2010, 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings, pp. 303-318, 2010, Springer, 978-3-642-15496-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Chao Zhang 0008, Tielei Wang, Tao Wei, Yu Chen, Wei Zou |
IntPatch: Automatically Fix Integer-Overflow-to-Buffer-Overflow Vulnerability at Compile-Time. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2010, 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings, pp. 71-86, 2010, Springer, 978-3-642-15496-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Sambuddho Chakravarty, Angelos Stavrou, Angelos D. Keromytis |
Traffic Analysis against Low-Latency Anonymity Networks Using Available Bandwidth Estimation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2010, 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings, pp. 249-267, 2010, Springer, 978-3-642-15496-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Ghassan Karame, Srdjan Capkun |
Low-Cost Client Puzzles Based on Modular Exponentiation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2010, 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings, pp. 679-697, 2010, Springer, 978-3-642-15496-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Guang Xiang, Bryan A. Pendleton, Jason I. Hong, Carolyn P. Rosé |
A Hierarchical Adaptive Probabilistic Approach for Zero Hour Phish Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2010, 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings, pp. 268-285, 2010, Springer, 978-3-642-15496-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Tien Tuan Anh Dinh, Mark Ryan 0001 |
Verifying Security Property of Peer-to-Peer Systems Using CSP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2010, 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings, pp. 319-339, 2010, Springer, 978-3-642-15496-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Artur Janc, Lukasz Olejnik |
Web Browser History Detection as a Real-World Privacy Threat. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2010, 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings, pp. 215-231, 2010, Springer, 978-3-642-15496-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Steve Kremer, Mark Ryan 0001, Ben Smyth |
Election Verifiability in Electronic Voting Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2010, 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings, pp. 389-404, 2010, Springer, 978-3-642-15496-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Alptekin Küpçü, Anna Lysyanskaya |
Optimistic Fair Exchange with Multiple Arbiters. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2010, 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings, pp. 488-507, 2010, Springer, 978-3-642-15496-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Rishab Nithyanand, Gene Tsudik, Ersin Uzun |
Readers Behaving Badly - Reader Revocation in PKI-Based RFID Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2010, 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings, pp. 19-36, 2010, Springer, 978-3-642-15496-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Dimitris Gritzalis, Bart Preneel, Marianthi Theoharidou (eds.) |
Computer Security - ESORICS 2010, 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![Springer, 978-3-642-15496-6 The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Octavian Catrina, Sebastiaan de Hoogh |
Secure Multiparty Linear Programming Using Fixed-Point Arithmetic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2010, 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings, pp. 134-150, 2010, Springer, 978-3-642-15496-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Jason Crampton, Michael Huth 0001 |
An Authorization Framework Resilient to Policy Evaluation Failures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2010, 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings, pp. 472-487, 2010, Springer, 978-3-642-15496-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Alexander Lux, Heiko Mantel |
Declassification with Explicit Reference Points. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings, pp. 69-85, 2009, Springer, 978-3-642-04443-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Sebastian Mödersheim, Luca Viganò 0001 |
Secure Pseudonymous Channels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings, pp. 337-354, 2009, Springer, 978-3-642-04443-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Drew Davidson, Randy Smith, Nic Doyle, Somesh Jha |
Protocol Normalization Using Attribute Grammars. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings, pp. 216-231, 2009, Springer, 978-3-642-04443-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Matteo Centenaro, Riccardo Focardi, Flaminia L. Luccio, Graham Steel |
Type-Based Analysis of PIN Processing APIs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings, pp. 53-68, 2009, Springer, 978-3-642-04443-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Mihhail Aizatulin, Henning Schnoor, Thomas Wilke |
Computationally Sound Analysis of a Probabilistic Contract Signing Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings, pp. 571-586, 2009, Springer, 978-3-642-04443-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Nataliya Guts, Cédric Fournet, Francesco Zappa Nardelli |
Reliable Evidence: Auditability by Typing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings, pp. 168-183, 2009, Springer, 978-3-642-04443-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Radha Jagadeesan, Alan Jeffrey, Corin Pitcher, James Riely |
Towards a Theory of Accountability and Audit. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings, pp. 152-167, 2009, Springer, 978-3-642-04443-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Rakeshbabu Bobba, Himanshu Khurana, Manoj Prabhakaran 0001 |
Attribute-Sets: A Practically Motivated Enhancement to Attribute-Based Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings, pp. 587-604, 2009, Springer, 978-3-642-04443-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Avik Chaudhuri, Deepak Garg 0001 |
PCAL: Language Support for Proof-Carrying Authorization Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings, pp. 184-199, 2009, Springer, 978-3-642-04443-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Scott A. Crosby, Dan S. Wallach |
Super-Efficient Aggregating History-Independent Persistent Authenticated Dictionaries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings, pp. 671-688, 2009, Springer, 978-3-642-04443-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Mauro Barni, Pierluigi Failla, Vladimir Kolesnikov, Riccardo Lazzeretti, Ahmad-Reza Sadeghi, Thomas Schneider 0003 |
Secure Evaluation of Private Linear Branching Programs with Medical Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings, pp. 424-439, 2009, Springer, 978-3-642-04443-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Philip W. L. Fong, Mohd M. Anwar, Zhen Zhao |
A Privacy Preservation Model for Facebook-Style Social Network Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings, pp. 303-320, 2009, Springer, 978-3-642-04443-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Darrell Bethea, Michael K. Reiter |
Data Structures with Unpredictable Timing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings, pp. 456-471, 2009, Springer, 978-3-642-04443-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Alejandro Russo, Andrei Sabelfeld, Andrey Chudnov |
Tracking Information Flow in Dynamic Tree Structures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings, pp. 86-103, 2009, Springer, 978-3-642-04443-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | George Danezis, Claudia Díaz, Emilia Käsper, Carmela Troncoso |
The Wisdom of Crowds: Attacks and Optimal Constructions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings, pp. 406-423, 2009, Springer, 978-3-642-04443-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Fangqi Sun, Liang Xu, Zhendong Su 0001 |
Client-Side Detection of XSS Worms by Monitoring Payload Propagation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings, pp. 539-554, 2009, Springer, 978-3-642-04443-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
cross-site scripting worm, client-side detection, Web application security |
1 | Cristian Ene, Yassine Lakhnech, Van Chan Ngo |
Formal Indistinguishability Extended to the Random Oracle Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings, pp. 555-570, 2009, Springer, 978-3-642-04443-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Véronique Cortier, Graham Steel |
A Generic Security API for Symmetric Key Management on Cryptographic Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings, pp. 605-620, 2009, Springer, 978-3-642-04443-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Joachim Biskup, Christian Gogolin, Jens Seiler, Torben Weibert |
Requirements and Protocols for Inference-Proof Interactions in Information Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings, pp. 285-302, 2009, Springer, 978-3-642-04443-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Sipat Triukose, Zakaria Al-Qudah, Michael Rabinovich |
Content Delivery Networks: Protection or Threat? ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings, pp. 371-389, 2009, Springer, 978-3-642-04443-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Thorsten Holz, Markus Engelberth, Felix C. Freiling |
Learning More about the Underground Economy: A Case-Study of Keyloggers and Dropzones. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings, pp. 1-18, 2009, Springer, 978-3-642-04443-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Michael Backes 0001, Peng Ning (eds.) |
Computer Security - ESORICS 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![Springer, 978-3-642-04443-4 The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Zhi Wang 0004, Xuxian Jiang, Weidong Cui, Xinyuan Wang 0005, Mike Grace |
ReFormat: Automatic Reverse Engineering of Encrypted Messages. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings, pp. 200-215, 2009, Springer, 978-3-642-04443-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Data Lifetime Analysis, Security, Reverse Engineering, Encryption, Network Protocols |
1 | Daisuke Mashima, Mustaque Ahamad, Swagath Kannan |
User-Centric Handling of Identity Agent Compromise. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings, pp. 19-36, 2009, Springer, 978-3-642-04443-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Sergio Maffeis, John C. Mitchell, Ankur Taly |
Isolating JavaScript with Filters, Rewriting, and Wrappers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings, pp. 505-522, 2009, Springer, 978-3-642-04443-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|