


default search action
19th ESORICS 2014: Wroclaw, Poland
- Miroslaw Kutylowski, Jaideep Vaidya:
Computer Security - ESORICS 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part II. Lecture Notes in Computer Science 8713, Springer 2014, ISBN 978-3-319-11211-4 - Kwangsu Lee
, Woo Kwon Koo, Dong Hoon Lee, Jong Hwan Park:
Public-Key Revocation and Tracing Schemes with Subset Difference Methods Revisited. 1-18 - Jean-Philippe Aumasson, Philipp Jovanovic, Samuel Neves
:
NORX: Parallel and Scalable AEAD. 19-36 - Giorgia Azzurra Marson, Bertram Poettering:
Even More Practical Secure Logging: Tree-Based Seekable Sequential Key Generators. 37-54 - Jianting Ning, Zhenfu Cao
, Xiaolei Dong, Lifei Wei, Xiaodong Lin:
Large Universe Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability. 55-72 - Jinguang Han
, Willy Susilo
, Yi Mu, Jianying Zhou
, Man Ho Au
:
PPDCP-ABE: Privacy-Preserving Decentralized Ciphertext-Policy Attribute-Based Encryption. 73-90 - Weiran Liu, Jianwei Liu
, Qianhong Wu, Bo Qin, Yunya Zhou:
Practical Direct Chosen Ciphertext Secure Key-Policy Attribute-Based Encryption with Public Ciphertext Test. 91-108 - Jan Camenisch, Anja Lehmann, Gregory Neven, Alfredo Rial:
Privacy-Preserving Auditing for Attribute-Based Credentials. 109-127 - Igor Bilogrevic, Julien Freudiger, Emiliano De Cristofaro, Ersin Uzun:
What's the Gist? Privacy-Preserving Aggregation of User Profiles. 128-145 - Raghavendran Balu, Teddy Furon, Sébastien Gambs:
Challenging Differential Privacy: The Case of Non-interactive Mechanisms. 146-164 - Joachim Biskup, Piero A. Bonatti
, Clemente Galdi
, Luigi Sauro:
Optimality and Complexity of Inference-Proof Data Filtering and CQE. 165-181 - Joseph K. Liu
, Man Ho Au
, Xinyi Huang, Willy Susilo
, Jianying Zhou
, Yong Yu
:
New Insight to Preserve Online Survey Accuracy and Privacy in Big Data Era. 182-199 - Jean-François Lalande
, Karine Heydemann, Pascal Berthomé:
Software Countermeasures for Control Flow Integrity of Smart Card C Codes. 200-218 - Tom Chothia, Yusuke Kawamoto
, Chris Novakovic
:
LeakWatch: Estimating Information Leakage from Java Programs. 219-236 - David I. Urbina, Yufei Gu, Juan Caballero, Zhiqiang Lin:
SigPath: A Memory Graph Based Approach for Program Data Introspection and Modification. 237-256 - Xun Yi, Feng Hao
, Elisa Bertino:
ID-Based Two-Server Password-Authenticated Key Exchange. 257-276 - Jörg Schwenk:
Modelling Time for Authenticated Key Exchange Protocols. 277-294 - Franziskus Kiefer, Mark Manulis
:
Zero-Knowledge Password Policy Checks and Verifier-Based PAKE. 295-312 - Christian Decker
, Roger Wattenhofer:
Bitcoin Transaction Malleability and MtGox. 313-326 - Véronique Cortier, David Galindo
, Stéphane Glondu, Malika Izabachène:
Election Verifiability for Helios under Weaker Trust Assumptions. 327-344 - Tim Ruffing
, Pedro Moreno-Sanchez
, Aniket Kate:
CoinShuffle: Practical Decentralized Coin Mixing for Bitcoin. 345-364 - John Sonchack, Adam J. Aviv
:
LESS Is More: Host-Agent Based Simulator for Large-Scale Evaluation of Security Systems. 365-382 - Christopher S. Gates, Ninghui Li, Zenglin Xu, Suresh N. Chari, Ian M. Molloy, Youngja Park:
Detecting Insider Information Theft Using Features from File Access Logs. 383-400 - Yong Wang, Zhaoyan Xu, Jialong Zhang, Lei Xu, Haopei Wang, Guofei Gu:
SRID: State Relation Based Intrusion Detection for False Data Injection Attacks in SCADA. 401-418 - Haitao Xu, Daiping Liu, Aaron Koehl, Haining Wang, Angelos Stavrou
:
Click Fraud Detection on the Advertiser Side. 419-438 - Shishir Nagaraja:
Botyacc: Unified P2P Botnet Detection Using Behavioural Analysis and Graph Analysis. 439-456 - Byungho Min, Vijay Varadharajan
:
Feature-Distributed Malware Attack: Risk and Defence. 457-474 - Lingchen Zhang, Sachin Shetty
, Peng Liu, Jiwu Jing:
RootkitDet: Practical End-to-End Defense against Kernel Rootkits in a Cloud Environment. 475-493 - Lingyu Wang, Mengyuan Zhang
, Sushil Jajodia
, Anoop Singhal, Massimiliano Albanese
:
Modeling Network Diversity for Evaluating the Robustness of Networks against Zero-Day Attacks. 494-511

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.