


default search action
29th ESORICS 2024: Bydgoszcz, Poland - Part II
- Joaquín García-Alfaro
, Rafal Kozik
, Michal Choras
, Sokratis K. Katsikas
:
Computer Security - ESORICS 2024 - 29th European Symposium on Research in Computer Security, Bydgoszcz, Poland, September 16-20, 2024, Proceedings, Part II. Lecture Notes in Computer Science 14983, Springer 2024, ISBN 978-3-031-70889-3
Network, Web, Hardware and Cloud
- Choongin Lee, Isa Jafarov, Sven Dietrich
, Heejo Lee:
PRETT2: Discovering HTTP/2 DoS Vulnerabilities via Protocol Reverse Engineering. 3-23 - Carlos Aguilar Melchor, Thomas Bailleux, Jason Goertzen, Adrien Guinet, David Joseph, Douglas Stebila
:
TurboTLS: TLS Connection Establishment with 1 Less Round Trip. 24-44 - Baiyang Li, Yujia Zhu, Yong Ding, Yong Sun, Yuedong Zhang, Qingyun Liu, Li Guo:
From Fingerprint to Footprint: Characterizing the Dependencies in Encrypted DNS Infrastructures. 45-64 - Jeroen Robben
, Mathy Vanhoef
:
Netfuzzlib: Adding First-Class Fuzzing Support to Network Protocol Implementations. 65-84 - Yihao Luo, Yunjie Deng, Jingquan Ge, Zhenyu Ning, Fengwei Zhang:
BootRIST: Detecting and Isolating Mercurial Cores at the Booting Stage. 85-103 - Md Mushfekur Rahman
, Philip W. L. Fong
:
Social Control and Interactivity in Anonymous Public Events. 104-122 - Jieyu Zheng, Haoliang Zhu, Yifan Dong, Zhenyu Song, Zhenhao Zhang, Yafang Yang, Yunlei Zhao:
Faster Post-quantum TLS 1.3 Based on ML-KEM: Implementation and Assessment. 123-143 - Daniel De Pascale, Giuseppe Cascavilla
, Damian A. Tamburri, Willem-Jan van den Heuvel:
CRATOR a CRAwler for TOR: Turning Dark Web Pages into Open Source INTelligence. 144-161 - Hongbo Xu, Zhenyu Cheng, Shuhao Li, Chenxu Wang, Peishuai Sun, Jiang Xie, Qingyun Liu:
ProxyKiller: An Anonymous Proxy Traffic Attack Model Based on Traffic Behavior Graphs. 162-181 - Wenxuan Wu, Soamar Homsi, Yupeng Zhang:
Confidential and Verifiable Machine Learning Delegations on the Cloud. 182-201 - Radu Mantu, Mihai Chiroiu, Costin Raiciu:
Process Identity-Based Firewalling. 202-221
Privacy and Personal Data Protection
- Ning Luo, Chenkai Weng, Jaspal Singh, Gefei Tan, Mariana Raykova, Ruzica Piskac:
Privacy-Preserving Regular Expression Matching Using TNFA. 225-246 - Rui Lian
, Yulong Ming
, Chengjun Cai, Yifeng Zheng, Cong Wang, Xiaohua Jia:
Nemesis: Combating Abusive Information in Encrypted Messaging with Private Reporting. 247-267 - Junlin He
, Lingguang Lei, Yuewu Wang, Pingjian Wang, Jiwu Jing:
ARPSSO: An OIDC-Compatible Privacy-Preserving SSO Scheme Based on RP Anonymization. 268-288 - Yukun Yan, Peng Tang, Rui Chen, Qilong Han, Ruochen Du:
DPC: Filtering Out Patch-Based Poisoned Samples with Differential Privacy. 289-309 - Jiaxuan Fu, Ke Cheng, Yuheng Xia, Anxiao Song, Qianxing Li, Yulong Shen:
Private Decision Tree Evaluation with Malicious Security via Function Secret Sharing. 310-330 - Keyang Liu
, Xingxin Li
, Tsuyoshi Takagi:
Review the Cuckoo Hash-Based Unbalanced Private Set Union: Leakage, Fix, and Optimization. 331-352 - David Eklund, Alfonso Iacovazzi, Han Wang, Apostolos Pyrgelis, Shahid Raza:
BMI: Bounded Mutual Information for Efficient Privacy-Preserving Feature Selection. 353-373 - Sonakshi Garg
, Vicenç Torra
:
Task-Specific Knowledge Distillation with Differential Privacy in LLMs. 374-389 - Yulian Sun
, Li Duan
, Ricardo Mendes
, Derui Zhu
, Yue Xia
, Yong Li, Asja Fischer
:
Exploiting Internal Randomness for Privacy in Vertical Federated Learning. 390-409 - Véronique Cortier, Alexandre Debant, Florian Moser:
Code Voting: When Simplicity Meets Security. 410-429 - Yu Chen, Lin Liu, Rongmao Chen, Shaojing Fu, Yuexiang Yang, Jiangyong Shi, Liangzhong He:
Speedy Privacy-Preserving Skyline Queries on Outsourced Data. 430-450 - Mirco Beltrame, Mauro Conti
, Pierpaolo Guglielmin, Francesco Marchiori, Gabriele Orazi:
RedactBuster: Entity Type Recognition from Redacted Documents. 451-470

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.