default search action
23rd ESORICS 2018: Barcelona, Spain
- Javier López, Jianying Zhou, Miguel Soriano:
Computer Security - 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part II. Lecture Notes in Computer Science 11099, Springer 2018, ISBN 978-3-319-98988-4
Mobile Security
- Prabhakaran Kasinathan, Jorge Cuéllar:
Workflow-Aware Security of Integrated Mobility Services. 3-19 - Kaiming Fang, Guanhua Yan:
Emulation-Instrumented Fuzz Testing of 4G/LTE Android Mobile Devices Guided by Reinforcement Learning. 20-40 - Sascha Groß, Abhishek Tiwari, Christian Hammer:
PIAnalyzer: A Precise Approach for PendingIntent Vulnerability Analysis. 41-59 - Christof Ferreira Torres, Hugo Jonker:
Investigating Fingerprinters and Fingerprinting-Alike Behaviour of Android Applications. 60-80
Database and Web Security
- Jianfeng Wang, Xiaofeng Chen, Shifeng Sun, Joseph K. Liu, Man Ho Au, Zhi-Hui Zhan:
Towards Efficient Verifiable Conjunctive Keyword Search for Large Encrypted Database. 83-100 - Xingchen Wang, Yunlei Zhao:
Order-Revealing Encryption: File-Injection Attack and Forward Security. 101-121 - Wenhao Wang, Benjamin Ferrell, Xiaoyang Xu, Kevin W. Hamlen, Shuang Hao:
SEISMIC: SEcure In-lined Script Monitors for Interrupting Cryptojacks. 122-142 - Haitao Xu, Zhao Li, Chen Chu, Yuanmi Chen, Yifan Yang, Haifeng Lu, Haining Wang, Angelos Stavrou:
Detecting and Characterizing Web Bot Traffic in a Large E-commerce Marketplace. 143-163
Cloud Security
- Jianghua Liu, Jinhua Ma, Wanlei Zhou, Yang Xiang, Xinyi Huang:
Dissemination of Authenticated Tree-Structured Data with Privacy Protection and Fine-Grained Control in Outsourced Databases. 167-186 - Jin Li, Heng Ye, Wei Wang, Wenjing Lou, Y. Thomas Hou, Jiqiang Liu, Rongxing Lu:
Efficient and Secure Outsourcing of Differentially Private Data Publication. 187-206 - Sarvar Patel, Giuseppe Persiano, Kevin Yeo:
Symmetric Searchable Encryption with Sharing and Unsharing. 207-227 - Cong Zuo, Shifeng Sun, Joseph K. Liu, Jun Shao, Josef Pieprzyk:
Dynamic Searchable Symmetric Encryption Schemes Supporting Range Queries with Forward (and Backward) Security. 228-246
Applied Crypto (I)
- Takanori Isobe, Kazuhiko Minematsu:
Breaking Message Integrity of an End-to-End Encryption Scheme of LINE. 249-268 - Jihye Kim, Seunghwa Lee, Jiwon Lee, Hyunok Oh:
Scalable Wildcarded Identity-Based Encryption. 269-287 - Benoît Libert, Thomas Peters, Chen Qian:
Logarithmic-Size Ring Signatures with Tight Security from the DDH Assumption. 288-308 - Karol Gotfryd, Pawel Lorek, Filip Zagórski:
RiffleScrambler - A Memory-Hard Password Storing Function. 309-328
Privacy (II)
- Sébastien Canard, David Pointcheval, Quentin Santos, Jacques Traoré:
Practical Strategy-Resistant Privacy-Preserving Elections. 331-349 - Gergei Bana, Rohit Chadha, Ajay Kumar Eeralla:
Formal Analysis of Vote Privacy Using Computationally Complete Symbolic Attacker. 350-372 - Xueou Wang, Xiaolu Hou, Ruben Rios, Per A. Hallgren, Nils Ole Tippenhauer, Martín Ochoa:
Location Proximity Attacks Against Mobile Targets: Analytical Bounds and Attacker Strategies. 373-392
Multi-party Computation
- Hiraku Morita, Nuttapong Attrapadung, Tadanori Teruya, Satsuya Ohata, Koji Nuida, Goichiro Hanaoka:
Constant-Round Client-Aided Secure Comparison Protocol. 395-415 - Niklas Büscher, Alina Weber, Stefan Katzenbeisser:
Towards Practical RAM Based Secure Computation. 416-437 - Marina Blanton, Myoungin Jeong:
Improved Signature Schemes for Secure Multi-party Computation with Certified Inputs. 438-460
SDN Security
- Amir Alimohammadifar, Suryadipta Majumdar, Taous Madi, Yosr Jarraya, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
Stealthy Probing-Based Verification (SPV): An Active Approach to Defending Software Defined Networks Against Topology Poisoning Attacks. 463-484 - Nicolae Paladi, Linus Karlsson, Khalid Elbashir:
Trust Anchors in Software Defined Networks. 485-504
Applied Crypto (II)
- Hui Ma, Rui Zhang, Guomin Yang, Zishuai Song, Shuzhou Sun, Yuting Xiao:
Concessive Online/Offline Attribute Based Encryption with Cryptographic Reverse Firewalls - Secure and Efficient Fine-Grained Access Control on Corrupted Machines. 507-526 - Junzuo Lai, Qiang Tang:
Making Any Attribute-Based Encryption Accountable, Efficiently. 527-547 - Yan Michalevsky, Marc Joye:
Decentralized Policy-Hiding ABE with Receiver Privacy. 548-567
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.