The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ESORICS"( http://dblp.L3S.de/Venues/ESORICS )

URL (DBLP): http://dblp.uni-trier.de/db/conf/esorics

Publication years (Num. hits)
1990 (25) 1992 (25) 1994 (27) 1996 (24) 1998 (25) 2000 (20) 2002 (17) 2003 (20) 2004 (28) 2005 (29) 2006 (33) 2007 (41) 2008 (38) 2009 (43) 2010 (43) 2011 (37) 2012 (51) 2013 (44)
Publication types (Num. hits)
inproceedings(552) proceedings(18)
Venues (Conferences, Journals, ...)
ESORICS(570)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 311 occurrences of 214 keywords

Results
Found 570 publication records. Showing 570 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Bruno Conchinha, David A. Basin, Carlos Caleiro Symbolic Probabilistic Analysis of Off-Line Guessing. Search on Bibsonomy ESORICS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Mathias Humbert, Théophile Studer, Matthias Grossglauser, Jean-Pierre Hubaux Nowhere to Hide: Navigating around Privacy in Online Social Networks. Search on Bibsonomy ESORICS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jinpeng Wei, Feng Zhu, Calton Pu KQguard: Binary-Centric Defense against Kernel Queue Injection Attacks. Search on Bibsonomy ESORICS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Arjan Jeckmans, Andreas Peter, Pieter H. Hartel Efficient Privacy-Enhanced Familiarity-Based Recommender System. Search on Bibsonomy ESORICS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Phani Vadrevu, Babak Rahbarinia, Roberto Perdisci, Kang Li 0001, Manos Antonakakis Measuring and Detecting Malware Downloads in Live Network Traffic. Search on Bibsonomy ESORICS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Colin Boyd, Cas Cremers, Michèle Feltz, Kenneth G. Paterson, Bertram Poettering, Douglas Stebila ASICS: Authenticated Key Exchange Security Incorporating Certification Systems. Search on Bibsonomy ESORICS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Steve Kremer, Robert Künnemann, Graham Steel Universally Composable Key-Management. Search on Bibsonomy ESORICS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Giorgia Azzurra Marson, Bertram Poettering Practical Secure Logging: Seekable Sequential Key Generators. Search on Bibsonomy ESORICS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Hugo Daniel Macedo, Tayssir Touili Mining Malware Specifications through Static Reachability Analysis. Search on Bibsonomy ESORICS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Özgür Dagdelen, Marc Fischlin, Tommaso Gagliardoni, Giorgia Azzurra Marson, Arno Mittelbach, Cristina Onete A Cryptographic Analysis of OPACITY - (Extended Abstract). Search on Bibsonomy ESORICS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Martin Gagné, Pascal Lafourcade 0001, Yassine Lakhnech Automated Security Proofs for Almost-Universal Hash for MAC Verification. Search on Bibsonomy ESORICS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Max I. Kanovich, Tajana Ban Kirigin, Vivek Nigam, Andre Scedrov Bounded Memory Protocols and Progressing Collaborative Systems. Search on Bibsonomy ESORICS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Benjamin S. Lerner, Liam Elberty, Neal Poole, Shriram Krishnamurthi Verifying Web Browser Extensions' Compliance with Private-Browsing Mode. Search on Bibsonomy ESORICS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jan Camenisch, Robert R. Enderlein, Victor Shoup Practical and Employable Protocols for UC-Secure Circuit Evaluation over ℤn. Search on Bibsonomy ESORICS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Aron Laszka, Benjamin Johnson 0001, Pascal Schöttle, Jens Grossklags, Rainer Böhme Managing the Weakest Link - A Game-Theoretic Approach for the Mitigation of Insider Threats. Search on Bibsonomy ESORICS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Shane S. Clark, Hossen A. Mustafa, Benjamin Ransford, Jacob Sorber, Kevin Fu, Wenyuan Xu Current Events: Identifying Webpages by Tapping the Electrical Outlet. Search on Bibsonomy ESORICS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Naipeng Dong, Hugo Jonker, Jun Pang Enforcing Privacy in the Presence of Others: Notions, Formalisations and Relations. Search on Bibsonomy ESORICS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Yossi Gilad, Amir Herzberg Plug-and-Play IP Security - Anonymity Infrastructure instead of PKI. Search on Bibsonomy ESORICS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Dmitry Kononchuk, Zekeriya Erkin, Jan C. A. van der Lubbe, Reginald L. Lagendijk Privacy-Preserving User Data Oriented Services for Groups with Dynamic Participation. Search on Bibsonomy ESORICS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jonathan Crussell, Clint Gibler, Hao Chen 0003 AnDarwin: Scalable Detection of Semantically Similar Android Applications. Search on Bibsonomy ESORICS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jafar Haadi Jafarian, Ehab Al-Shaer, Qi Duan Formal Approach for Route Agility against Persistent Attackers. Search on Bibsonomy ESORICS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Andreas Griesmayer, Charles Morisset Automated Certification of Authorisation Policy Resistance. Search on Bibsonomy ESORICS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Ivan Damgård, Marcel Keller, Enrique Larraia, Valerio Pastro, Peter Scholl, Nigel P. Smart Practical Covertly Secure MPC for Dishonest Majority - Or: Breaking the SPDZ Limits. Search on Bibsonomy ESORICS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jun Furukawa 0001 Request-Based Comparable Encryption. Search on Bibsonomy ESORICS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Dan Caselden, Alex Bazhanyuk, Mathias Payer, Stephen McCamant, Dawn Song HI-CFG: Construction by Binary Analysis and Application to Attack Polymorphism. Search on Bibsonomy ESORICS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Michael Carl Tschantz, Anupam Datta, Jeannette M. Wing Purpose Restrictions on Information Use. Search on Bibsonomy ESORICS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Mishari Al Mishari, Paolo Gasti, Gene Tsudik, Ekin Oguz Privacy-Preserving Matching of Community-Contributed Content. Search on Bibsonomy ESORICS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Yossef Oren, Dvir Schirman, Avishai Wool Range Extension Attacks on Contactless Smart Cards. Search on Bibsonomy ESORICS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Ben Smyth, David Bernhard Ballot Secrecy and Ballot Independence Coincide. Search on Bibsonomy ESORICS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Youngja Park, Christopher S. Gates, Stephen C. Gates Estimating Asset Sensitivity by Profiling Users. Search on Bibsonomy ESORICS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jun Dai, Xiaoyan Sun, Peng Liu 0005 Patrol: Revealing Zero-Day Attack Paths through Network-Wide System Object Dependencies. Search on Bibsonomy ESORICS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Lei Wei 0004, Michael K. Reiter Ensuring File Authenticity in Private DFA Evaluation on Encrypted Files in the Cloud. Search on Bibsonomy ESORICS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Edouard Cuvelier, Olivier Pereira, Thomas Peters Election Verifiability or Ballot Privacy: Do We Need to Choose? Search on Bibsonomy ESORICS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jason Crampton, Sushil Jajodia, Keith Mayes (eds.) Computer Security - ESORICS 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings Search on Bibsonomy ESORICS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Zhui Deng, Xiangyu Zhang 0001, Dongyan Xu BISTRO: Binary Component Extraction and Embedding for Software Security Applications. Search on Bibsonomy ESORICS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Limin Jia, Jassim Aljuraidan, Elli Fragkaki, Lujo Bauer, Michael Stroucken, Kazuhide Fukushima, Shinsaku Kiyomoto, Yutaka Miyake Run-Time Enforcement of Information-Flow Properties on Android - (Extended Abstract). Search on Bibsonomy ESORICS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Marco Valerio Barbera, Vasileios P. Kemerlis, Vasilis Pappas, Angelos D. Keromytis CellFlood: Attacking Tor Onion Routers on the Cheap. Search on Bibsonomy ESORICS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jin Li 0002, Xiaofeng Chen 0001, Jingwei Li, Chunfu Jia, Jianfeng Ma, Wenjing Lou Fine-Grained Access Control System Based on Outsourced Attribute-Based Encryption. Search on Bibsonomy ESORICS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Gerardo Pelosi, Pierangela Samarati Distributed Shuffling for Preserving Access Confidentiality. Search on Bibsonomy ESORICS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Xinshu Dong, Hong Hu, Prateek Saxena, Zhenkai Liang A Quantitative Evaluation of Privilege Separation in Web Browser Designs. Search on Bibsonomy ESORICS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Amir Herzberg, Haya Shulman Vulnerable Delegation of DNS Resolution. Search on Bibsonomy ESORICS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Michael Backes 0001, Dario Fiore, Esfandiar Mohammadi Privacy-Preserving Accountable Computation. Search on Bibsonomy ESORICS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Deian Stefan, Pablo Buiras, Edward Z. Yang, Amit Levy, David Terei, Alejandro Russo, David Mazières Eliminating Cache-Based Timing Attacks with Instruction-Based Scheduling. Search on Bibsonomy ESORICS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Devdatta Akhawe, Frank Li, Warren He, Prateek Saxena, Dawn Song Data-Confined HTML5 Applications. Search on Bibsonomy ESORICS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jack W. Stokes, John C. Platt, Helen J. Wang, Joe Faulhaber, Jonathan Keller, Mady Marinescu, Anil Thomas, Marius Gheorghescu Scalable Telemetry Classification for Automated Malware Detection. Search on Bibsonomy ESORICS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Jannik Dreier, Pascal Lafourcade 0001, Yassine Lakhnech Defining Privacy for Weighted Votes, Single and Multi-voter Coercion. Search on Bibsonomy ESORICS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Qijun Gu, Kyle Jones, Wanyu Zang, Meng Yu, Peng Liu Revealing Abuses of Channel Assignment Protocols in Multi-channel Wireless Networks: An Investigation Logic Approach. Search on Bibsonomy ESORICS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Aanjhan Ranganathan, Nils Ole Tippenhauer, Boris Skoric, Dave Singelée, Srdjan Capkun Design and Implementation of a Terrorist Fraud Resilient Distance Bounding System. Search on Bibsonomy ESORICS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Amir Herzberg, Haya Shulman Security of Patched DNS. Search on Bibsonomy ESORICS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Mengtao Sun, Gang Tan JVM-Portable Sandboxing of Java's Native Libraries. Search on Bibsonomy ESORICS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Serdar Erbatur, Santiago Escobar, Deepak Kapur, Zhiqiang Liu, Christopher Lynch, Catherine A. Meadows, José Meseguer, Paliath Narendran, Sonia Santiago, Ralf Sasse Effective Symbolic Protocol Analysis via Equational Irreducibility Conditions. Search on Bibsonomy ESORICS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Elli Fragkaki, Lujo Bauer, Limin Jia, David Swasey Modeling and Enhancing Android's Permission System. Search on Bibsonomy ESORICS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Jonathan Crussell, Clint Gibler, Hao Chen 0003 Attack of the Clones: Detecting Cloned Applications on Android Markets. Search on Bibsonomy ESORICS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Tzipora Halevi, Di Ma, Nitesh Saxena, Tuo Xiang Secure Proximity Detection for NFC Devices Based on Ambient Sensor Data. Search on Bibsonomy ESORICS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Fuchun Guo, Yi Mu 0001, Willy Susilo Identity-Based Traitor Tracing with Short Private Key and Short Ciphertext. Search on Bibsonomy ESORICS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Jinkyu Koo, Xiaojun Lin, Saurabh Bagchi PRIVATUS: Wallet-Friendly Privacy Protection for Smart Meters. Search on Bibsonomy ESORICS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Sara Foresti, Moti Yung, Fabio Martinelli (eds.) Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings Search on Bibsonomy ESORICS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Arnar Birgisson, Daniel Hedin, Andrei Sabelfeld Boosting the Permissiveness of Dynamic Information-Flow Tracking by Testing. Search on Bibsonomy ESORICS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Yao Zheng, Ming Li 0003, Wenjing Lou, Y. Thomas Hou SHARP: Private Proximity Test and Secure Handshake with Cheat-Proof Location Tags. Search on Bibsonomy ESORICS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1David Galindo, Javier Herranz, Jorge L. Villar Identity-Based Encryption with Master Key-Dependent Message Security and Leakage-Resilience. Search on Bibsonomy ESORICS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Philippe Beaucamps, Isabelle Gnaedig, Jean-Yves Marion Abstraction-Based Malware Analysis Using Rewriting and Model Checking. Search on Bibsonomy ESORICS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Arif Akram Khan, Philip W. L. Fong Satisfiability and Feasibility in a Relationship-Based Workflow Authorization Model. Search on Bibsonomy ESORICS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Daisuke Moriyama, Shin'ichiro Matsuo, Miyako Ohkubo Relations among Notions of Privacy for RFID Authentication Protocols. Search on Bibsonomy ESORICS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Italo Dacosta, Mustaque Ahamad, Patrick Traynor Trust No One Else: Detecting MITM Attacks against SSL/TLS without Third-Parties. Search on Bibsonomy ESORICS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Matthew K. Franklin, Haibin Zhang Unique Group Signatures. Search on Bibsonomy ESORICS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Sebastian Mödersheim Deciding Security for a Fragment of ASLan. Search on Bibsonomy ESORICS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Henning Schnoor Deciding Epistemic and Strategic Properties of Cryptographic Protocols. Search on Bibsonomy ESORICS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Joseph K. Liu, Man Ho Au, Willy Susilo, Jianying Zhou 0001 Enhancing Location Privacy for Electric Vehicles (at the Right time). Search on Bibsonomy ESORICS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Xiaofeng Chen 0001, Jin Li 0002, Jianfeng Ma, Qiang Tang 0001, Wenjing Lou New Algorithms for Secure Outsourcing of Modular Exponentiations. Search on Bibsonomy ESORICS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Adam J. Aviv, Micah Sherr, Matt Blaze, Jonathan M. Smith Privacy-Aware Message Exchanges for Geographically Routed Human Movement Networks. Search on Bibsonomy ESORICS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Charanjit S. Jutla, Arnab Roy 0003 Decision Procedures for Simulatability. Search on Bibsonomy ESORICS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Naveed Ahmed, Christian Damsgaard Jensen, Erik Zenner Towards Symbolic Encryption Schemes. Search on Bibsonomy ESORICS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Ralph Holz, Thomas Riedmaier, Nils Kammenhuber, Georg Carle X.509 Forensics: Detecting and Localising the SSL/TLS Men-in-the-Middle. Search on Bibsonomy ESORICS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Rakesh M. Verma, Narasimha Shashidhar, Nabil Hossain Detecting Phishing Emails the Natural Language Way. Search on Bibsonomy ESORICS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Ziming Zhao 0001, Gail-Joon Ahn, Hongxin Hu, Deepinder Mahi SocialImpact: Systematic Analysis of Underground Social Dynamics. Search on Bibsonomy ESORICS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Ruben Rios, Jorge Cuéllar, Javier López 0001 Robust Probabilistic Fake Packet Injection for Receiver-Location Privacy in WSN. Search on Bibsonomy ESORICS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Paolo Gasti, Kasper Bonne Rasmussen On the Security of Password Manager Database Formats. Search on Bibsonomy ESORICS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Ahmad-Reza Sadeghi, Steffen Schulz 0001, Vijay Varadharajan The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNs. Search on Bibsonomy ESORICS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Deepak D'Souza, K. R. Raghavendra Model-Checking Bisimulation-Based Information Flow Properties for Infinite State Systems. Search on Bibsonomy ESORICS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Yvo Desmedt, Pyrros Chaidos Applying Divertibility to Blind Ballot Copying in the Helios Internet Voting System. Search on Bibsonomy ESORICS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Naipeng Dong, Hugo Jonker, Jun Pang Formal Analysis of Privacy in an eHealth Protocol. Search on Bibsonomy ESORICS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Tibor Jager, Sebastian Schinzel, Juraj Somorovsky Bleichenbacher's Attack Strikes again: Breaking PKCS#1 v1.5 in XML Encryption. Search on Bibsonomy ESORICS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Flavio D. Garcia, Gerhard de Koning Gans, Roel Verdult, Milosch Meriac Dismantling iClass and iClass Elite. Search on Bibsonomy ESORICS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Massimiliano Albanese, Alessandra De Benedictis, Sushil Jajodia, Paulo Shakarian A Probabilistic Framework for Localization of Attackers in MANETs. Search on Bibsonomy ESORICS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Marina Blanton, Mikhail J. Atallah, Keith B. Frikken, Qutaibah M. Malluhi Secure and Efficient Outsourcing of Sequence Comparisons. Search on Bibsonomy ESORICS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Simon Eberz, Martin Strohmeier, Matthias Wilhelm, Ivan Martinovic A Practical Man-In-The-Middle Attack on Signal-Based Key Generation Protocols. Search on Bibsonomy ESORICS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Markus Dürmuth, Tim Güneysu, Markus Kasper, Christof Paar, Tolga Yalçin, Ralf Zimmermann 0001 Evaluation of Standardized Password-Based Key Derivation against Parallel Processing Platforms. Search on Bibsonomy ESORICS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Lei Wei 0004, Michael K. Reiter Third-Party Private DFA Evaluation on Encrypted Files in the Cloud. Search on Bibsonomy ESORICS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Kin Ying Yu, Tsz Hon Yuen, Sherman S. M. Chow, Siu-Ming Yiu, Lucas Chi Kwong Hui PE(AR)2: Privacy-Enhanced Anonymous Authentication with Reputation and Revocation. Search on Bibsonomy ESORICS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Mishari Al Mishari, Gene Tsudik Exploring Linkability of User Reviews. Search on Bibsonomy ESORICS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Karl-Peter Fuchs, Dominik Herrmann, Hannes Federrath Introducing the gMix Open Source Framework for Mix Implementations. Search on Bibsonomy ESORICS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Yongzheng Wu, Sai Sathyanarayan, Roland H. C. Yap, Zhenkai Liang Codejail: Application-Transparent Isolation of Libraries with Tight Program Interactions. Search on Bibsonomy ESORICS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Alex Biryukov, Ivan Pustogarov, Ralf-Philipp Weinmann TorScan: Tracing Long-Lived Connections and Differential Scanning Attacks. Search on Bibsonomy ESORICS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Cas J. F. Cremers, Michèle Feltz Beyond eCK: Perfect Forward Secrecy under Actor Compromise and Ephemeral-Key Reveal. Search on Bibsonomy ESORICS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1James Kelley, Roberto Tamassia, Nikos Triandopoulos Hardening Access Control and Data Protection in GFS-like File Systems. Search on Bibsonomy ESORICS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Alfred Kobsa, Rishab Nithyanand, Gene Tsudik, Ersin Uzun Usability of Display-Equipped RFID Tags for Security Purposes. Search on Bibsonomy ESORICS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Nashad Ahmed Safa, Saikat Sarkar, Reihaneh Safavi-Naini, Majid Ghaderi Secure Localization Using Dynamic Verifiers. Search on Bibsonomy ESORICS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Elie Bursztein, Baptiste Gourdin, John C. Mitchell Reclaiming the Blogosphere, TalkBack: A Secure LinkBack Protocol for Weblogs. Search on Bibsonomy ESORICS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Ka Yang, Jinsheng Zhang, Wensheng Zhang 0001, Daji Qiao A Light-Weight Solution to Preservation of Access Pattern Privacy in Un-trusted Clouds. Search on Bibsonomy ESORICS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Dominique Schröder How to Aggregate the CL Signature Scheme. Search on Bibsonomy ESORICS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 570 (100 per page; Change: )
Pages: [1][2][3][4][5][6][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license