Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/esorics/esorics2009.bht:"
@inproceedings{DBLP:conf/esorics/AizatulinSW09, author = {Mihhail Aizatulin and Henning Schnoor and Thomas Wilke}, editor = {Michael Backes and Peng Ning}, title = {Computationally Sound Analysis of a Probabilistic Contract Signing Protocol}, booktitle = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5789}, pages = {571--586}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04444-1\_35}, doi = {10.1007/978-3-642-04444-1\_35}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/AizatulinSW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/BarniFKLSS09, author = {Mauro Barni and Pierluigi Failla and Vladimir Kolesnikov and Riccardo Lazzeretti and Ahmad{-}Reza Sadeghi and Thomas Schneider}, editor = {Michael Backes and Peng Ning}, title = {Secure Evaluation of Private Linear Branching Programs with Medical Applications}, booktitle = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5789}, pages = {424--439}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04444-1\_26}, doi = {10.1007/978-3-642-04444-1\_26}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/BarniFKLSS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/BasinBK09, author = {David A. Basin and Samuel J. Burri and G{\"{u}}nter Karjoth}, editor = {Michael Backes and Peng Ning}, title = {Dynamic Enforcement of Abstract Separation of Duty Constraints}, booktitle = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5789}, pages = {250--267}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04444-1\_16}, doi = {10.1007/978-3-642-04444-1\_16}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/BasinBK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/BetheaR09, author = {Darrell Bethea and Michael K. Reiter}, editor = {Michael Backes and Peng Ning}, title = {Data Structures with Unpredictable Timing}, booktitle = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5789}, pages = {456--471}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04444-1\_28}, doi = {10.1007/978-3-642-04444-1\_28}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/BetheaR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/BiskupGSW09, author = {Joachim Biskup and Christian Gogolin and Jens Seiler and Torben Weibert}, editor = {Michael Backes and Peng Ning}, title = {Requirements and Protocols for Inference-Proof Interactions in Information Systems}, booktitle = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5789}, pages = {285--302}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04444-1\_18}, doi = {10.1007/978-3-642-04444-1\_18}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/BiskupGSW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/BobbaKP09, author = {Rakeshbabu Bobba and Himanshu Khurana and Manoj Prabhakaran}, editor = {Michael Backes and Peng Ning}, title = {Attribute-Sets: {A} Practically Motivated Enhancement to Attribute-Based Encryption}, booktitle = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5789}, pages = {587--604}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04444-1\_36}, doi = {10.1007/978-3-642-04444-1\_36}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/BobbaKP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/CentenaroFLS09, author = {Matteo Centenaro and Riccardo Focardi and Flaminia L. Luccio and Graham Steel}, editor = {Michael Backes and Peng Ning}, title = {Type-Based Analysis of {PIN} Processing APIs}, booktitle = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5789}, pages = {53--68}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04444-1\_4}, doi = {10.1007/978-3-642-04444-1\_4}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/CentenaroFLS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/ChaudhuriG09, author = {Avik Chaudhuri and Deepak Garg}, editor = {Michael Backes and Peng Ning}, title = {{PCAL:} Language Support for Proof-Carrying Authorization Systems}, booktitle = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5789}, pages = {184--199}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04444-1\_12}, doi = {10.1007/978-3-642-04444-1\_12}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/ChaudhuriG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/ChenC09, author = {Liang Chen and Jason Crampton}, editor = {Michael Backes and Peng Ning}, title = {Set Covering Problems in Role-Based Access Control}, booktitle = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5789}, pages = {689--704}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04444-1\_42}, doi = {10.1007/978-3-642-04444-1\_42}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/ChenC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/CirianiVFJPS09, author = {Valentina Ciriani and Sabrina De Capitani di Vimercati and Sara Foresti and Sushil Jajodia and Stefano Paraboschi and Pierangela Samarati}, editor = {Michael Backes and Peng Ning}, title = {Keep a Few: Outsourcing Data While Maintaining Confidentiality}, booktitle = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5789}, pages = {440--455}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04444-1\_27}, doi = {10.1007/978-3-642-04444-1\_27}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/CirianiVFJPS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/CortierS09, author = {V{\'{e}}ronique Cortier and Graham Steel}, editor = {Michael Backes and Peng Ning}, title = {A Generic Security {API} for Symmetric Key Management on Cryptographic Devices}, booktitle = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5789}, pages = {605--620}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04444-1\_37}, doi = {10.1007/978-3-642-04444-1\_37}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/CortierS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/CrescenzoJS09, author = {Giovanni Di Crescenzo and Shaoquan Jiang and Reihaneh Safavi{-}Naini}, editor = {Michael Backes and Peng Ning}, title = {Corruption-Localizing Hashing}, booktitle = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5789}, pages = {489--504}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04444-1\_30}, doi = {10.1007/978-3-642-04444-1\_30}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/CrescenzoJS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/CrosbyW09, author = {Scott A. Crosby and Dan S. Wallach}, editor = {Michael Backes and Peng Ning}, title = {Super-Efficient Aggregating History-Independent Persistent Authenticated Dictionaries}, booktitle = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5789}, pages = {671--688}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04444-1\_41}, doi = {10.1007/978-3-642-04444-1\_41}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/CrosbyW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/DanezisDKT09, author = {George Danezis and Claudia D{\'{\i}}az and Emilia K{\"{a}}sper and Carmela Troncoso}, editor = {Michael Backes and Peng Ning}, title = {The Wisdom of Crowds: Attacks and Optimal Constructions}, booktitle = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5789}, pages = {406--423}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04444-1\_25}, doi = {10.1007/978-3-642-04444-1\_25}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/DanezisDKT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/DavidsonSDJ09, author = {Drew Davidson and Randy Smith and Nic Doyle and Somesh Jha}, editor = {Michael Backes and Peng Ning}, title = {Protocol Normalization Using Attribute Grammars}, booktitle = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5789}, pages = {216--231}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04444-1\_14}, doi = {10.1007/978-3-642-04444-1\_14}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/DavidsonSDJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/DeursenMRV09, author = {Ton van Deursen and Sjouke Mauw and Sasa Radomirovic and Pim Vullers}, editor = {Michael Backes and Peng Ning}, title = {Secure Ownership and Ownership Transfer in {RFID} Systems}, booktitle = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5789}, pages = {637--654}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04444-1\_39}, doi = {10.1007/978-3-642-04444-1\_39}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/DeursenMRV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/EneLN09, author = {Cristian Ene and Yassine Lakhnech and Van Chan Ngo}, editor = {Michael Backes and Peng Ning}, title = {Formal Indistinguishability Extended to the Random Oracle Model}, booktitle = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5789}, pages = {555--570}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04444-1\_34}, doi = {10.1007/978-3-642-04444-1\_34}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/EneLN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/FongAZ09, author = {Philip W. L. Fong and Mohd M. Anwar and Zhen Zhao}, editor = {Michael Backes and Peng Ning}, title = {A Privacy Preservation Model for Facebook-Style Social Network Systems}, booktitle = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5789}, pages = {303--320}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04444-1\_19}, doi = {10.1007/978-3-642-04444-1\_19}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/FongAZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/GiladH09, author = {Yossi Gilad and Amir Herzberg}, editor = {Michael Backes and Peng Ning}, title = {Lightweight Opportunistic Tunneling {(LOT)}}, booktitle = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5789}, pages = {104--119}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04444-1\_7}, doi = {10.1007/978-3-642-04444-1\_7}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/GiladH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/GutsFN09, author = {Nataliya Guts and C{\'{e}}dric Fournet and Francesco Zappa Nardelli}, editor = {Michael Backes and Peng Ning}, title = {Reliable Evidence: Auditability by Typing}, booktitle = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5789}, pages = {168--183}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04444-1\_11}, doi = {10.1007/978-3-642-04444-1\_11}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/GutsFN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/HolzEF09, author = {Thorsten Holz and Markus Engelberth and Felix C. Freiling}, editor = {Michael Backes and Peng Ning}, title = {Learning More about the Underground Economy: {A} Case-Study of Keyloggers and Dropzones}, booktitle = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5789}, pages = {1--18}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04444-1\_1}, doi = {10.1007/978-3-642-04444-1\_1}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/HolzEF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/JagadeesanJPR09, author = {Radha Jagadeesan and Alan Jeffrey and Corin Pitcher and James Riely}, editor = {Michael Backes and Peng Ning}, title = {Towards a Theory of Accountability and Audit}, booktitle = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5789}, pages = {152--167}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04444-1\_10}, doi = {10.1007/978-3-642-04444-1\_10}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/JagadeesanJPR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/LeMayG09, author = {Michael LeMay and Carl A. Gunter}, editor = {Michael Backes and Peng Ning}, title = {Cumulative Attestation Kernels for Embedded Systems}, booktitle = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5789}, pages = {655--670}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04444-1\_40}, doi = {10.1007/978-3-642-04444-1\_40}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/LeMayG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/LiML09, author = {Tiancheng Li and Xiaonan Ma and Ninghui Li}, editor = {Michael Backes and Peng Ning}, title = {{WORM-SEAL:} Trustworthy Data Retention and Verification for Regulatory Compliance}, booktitle = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5789}, pages = {472--488}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04444-1\_29}, doi = {10.1007/978-3-642-04444-1\_29}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/LiML09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/LiuGASSK09, author = {Yali Liu and Dipak Ghosal and Frederik Armknecht and Ahmad{-}Reza Sadeghi and Steffen Schulz and Stefan Katzenbeisser}, editor = {Michael Backes and Peng Ning}, title = {Hide and Seek in Time - Robust Covert Timing Channels}, booktitle = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5789}, pages = {120--135}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04444-1\_8}, doi = {10.1007/978-3-642-04444-1\_8}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/LiuGASSK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/LuxM09, author = {Alexander Lux and Heiko Mantel}, editor = {Michael Backes and Peng Ning}, title = {Declassification with Explicit Reference Points}, booktitle = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5789}, pages = {69--85}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04444-1\_5}, doi = {10.1007/978-3-642-04444-1\_5}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/LuxM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/MaffeisMT09, author = {Sergio Maffeis and John C. Mitchell and Ankur Taly}, editor = {Michael Backes and Peng Ning}, title = {Isolating JavaScript with Filters, Rewriting, and Wrappers}, booktitle = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5789}, pages = {505--522}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04444-1\_31}, doi = {10.1007/978-3-642-04444-1\_31}, timestamp = {Sun, 12 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/MaffeisMT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/MashimaAK09, author = {Daisuke Mashima and Mustaque Ahamad and Swagath Kannan}, editor = {Michael Backes and Peng Ning}, title = {User-Centric Handling of Identity Agent Compromise}, booktitle = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5789}, pages = {19--36}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04444-1\_2}, doi = {10.1007/978-3-642-04444-1\_2}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/MashimaAK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/ModersheimV09, author = {Sebastian M{\"{o}}dersheim and Luca Vigan{\`{o}}}, editor = {Michael Backes and Peng Ning}, title = {Secure Pseudonymous Channels}, booktitle = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5789}, pages = {337--354}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04444-1\_21}, doi = {10.1007/978-3-642-04444-1\_21}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/ModersheimV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/NgSMS09, author = {Ching Yu Ng and Willy Susilo and Yi Mu and Reihaneh Safavi{-}Naini}, editor = {Michael Backes and Peng Ning}, title = {New Privacy Results on Synchronized {RFID} Authentication Protocols against Tag Tracing}, booktitle = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5789}, pages = {321--336}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04444-1\_20}, doi = {10.1007/978-3-642-04444-1\_20}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/NgSMS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/OpreaB09, author = {Alina Oprea and Kevin D. Bowers}, editor = {Michael Backes and Peng Ning}, title = {Authentic Time-Stamps for Archival Storage}, booktitle = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5789}, pages = {136--151}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04444-1\_9}, doi = {10.1007/978-3-642-04444-1\_9}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/OpreaB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/PengZCG09, author = {Yanlin Peng and Linfeng Zhang and J. Morris Chang and Yong Guan}, editor = {Michael Backes and Peng Ning}, title = {An Effective Method for Combating Malicious Scripts Clickbots}, booktitle = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5789}, pages = {523--538}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04444-1\_32}, doi = {10.1007/978-3-642-04444-1\_32}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/PengZCG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/RussoSC09, author = {Alejandro Russo and Andrei Sabelfeld and Andrey Chudnov}, editor = {Michael Backes and Peng Ning}, title = {Tracking Information Flow in Dynamic Tree Structures}, booktitle = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5789}, pages = {86--103}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04444-1\_6}, doi = {10.1007/978-3-642-04444-1\_6}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/RussoSC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/ShankesiASGM09, author = {Ravinder Shankesi and Musab AlTurki and Ralf Sasse and Carl A. Gunter and Jos{\'{e}} Meseguer}, editor = {Michael Backes and Peng Ning}, title = {Model-Checking DoS Amplification for VoIP Session Initiation}, booktitle = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5789}, pages = {390--405}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04444-1\_24}, doi = {10.1007/978-3-642-04444-1\_24}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/ShankesiASGM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/StuderP09, author = {Ahren Studer and Adrian Perrig}, editor = {Michael Backes and Peng Ning}, title = {The Coremelt Attack}, booktitle = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5789}, pages = {37--52}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04444-1\_3}, doi = {10.1007/978-3-642-04444-1\_3}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/StuderP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/SunXS09, author = {Fangqi Sun and Liang Xu and Zhendong Su}, editor = {Michael Backes and Peng Ning}, title = {Client-Side Detection of {XSS} Worms by Monitoring Payload Propagation}, booktitle = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5789}, pages = {539--554}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04444-1\_33}, doi = {10.1007/978-3-642-04444-1\_33}, timestamp = {Tue, 30 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/SunXS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/TippenhauerC09, author = {Nils Ole Tippenhauer and Srdjan Capkun}, editor = {Michael Backes and Peng Ning}, title = {ID-Based Secure Distance Bounding and Localization}, booktitle = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5789}, pages = {621--636}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04444-1\_38}, doi = {10.1007/978-3-642-04444-1\_38}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/TippenhauerC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/TriukoseAR09, author = {Sipat Triukose and Zakaria Al{-}Qudah and Michael Rabinovich}, editor = {Michael Backes and Peng Ning}, title = {Content Delivery Networks: Protection or Threat?}, booktitle = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5789}, pages = {371--389}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04444-1\_23}, doi = {10.1007/978-3-642-04444-1\_23}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/TriukoseAR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/WangJCWG09, author = {Zhi Wang and Xuxian Jiang and Weidong Cui and Xinyuan Wang and Mike Grace}, editor = {Michael Backes and Peng Ning}, title = {ReFormat: Automatic Reverse Engineering of Encrypted Messages}, booktitle = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5789}, pages = {200--215}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04444-1\_13}, doi = {10.1007/978-3-642-04444-1\_13}, timestamp = {Fri, 04 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/WangJCWG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/WangJL09, author = {Qihua Wang and Hongxia Jin and Ninghui Li}, editor = {Michael Backes and Peng Ning}, title = {Usable Access Control in Collaborative Environments: Authorization Based on People-Tagging}, booktitle = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5789}, pages = {268--284}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04444-1\_17}, doi = {10.1007/978-3-642-04444-1\_17}, timestamp = {Thu, 28 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/WangJL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/WangWLRL09, author = {Qian Wang and Cong Wang and Jin Li and Kui Ren and Wenjing Lou}, editor = {Michael Backes and Peng Ning}, title = {Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing}, booktitle = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5789}, pages = {355--370}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04444-1\_22}, doi = {10.1007/978-3-642-04444-1\_22}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/WangWLRL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/WurzingerBHGKK09, author = {Peter Wurzinger and Leyla Bilge and Thorsten Holz and Jan Goebel and Christopher Kruegel and Engin Kirda}, editor = {Michael Backes and Peng Ning}, title = {Automatically Generating Models for Botnet Detection}, booktitle = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5789}, pages = {232--249}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04444-1\_15}, doi = {10.1007/978-3-642-04444-1\_15}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/WurzingerBHGKK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esorics/2009, editor = {Michael Backes and Peng Ning}, title = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5789}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04444-1}, doi = {10.1007/978-3-642-04444-1}, isbn = {978-3-642-04443-4}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.