- Alina Oprea, Kevin D. Bowers:
Authentic Time-Stamps for Archival Storage. ESORICS 2009: 136-151 - Yanlin Peng, Linfeng Zhang, J. Morris Chang, Yong Guan:
An Effective Method for Combating Malicious Scripts Clickbots. ESORICS 2009: 523-538 - Alejandro Russo, Andrei Sabelfeld, Andrey Chudnov:
Tracking Information Flow in Dynamic Tree Structures. ESORICS 2009: 86-103 - Ravinder Shankesi, Musab AlTurki, Ralf Sasse, Carl A. Gunter, José Meseguer:
Model-Checking DoS Amplification for VoIP Session Initiation. ESORICS 2009: 390-405 - Ahren Studer, Adrian Perrig:
The Coremelt Attack. ESORICS 2009: 37-52 - Fangqi Sun, Liang Xu, Zhendong Su:
Client-Side Detection of XSS Worms by Monitoring Payload Propagation. ESORICS 2009: 539-554 - Nils Ole Tippenhauer, Srdjan Capkun:
ID-Based Secure Distance Bounding and Localization. ESORICS 2009: 621-636 - Sipat Triukose, Zakaria Al-Qudah, Michael Rabinovich:
Content Delivery Networks: Protection or Threat? ESORICS 2009: 371-389 - Zhi Wang, Xuxian Jiang, Weidong Cui, Xinyuan Wang, Mike Grace:
ReFormat: Automatic Reverse Engineering of Encrypted Messages. ESORICS 2009: 200-215 - Qihua Wang, Hongxia Jin, Ninghui Li:
Usable Access Control in Collaborative Environments: Authorization Based on People-Tagging. ESORICS 2009: 268-284 - Qian Wang, Cong Wang, Jin Li, Kui Ren, Wenjing Lou:
Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing. ESORICS 2009: 355-370 - Peter Wurzinger, Leyla Bilge, Thorsten Holz, Jan Goebel, Christopher Kruegel, Engin Kirda:
Automatically Generating Models for Botnet Detection. ESORICS 2009: 232-249 - Michael Backes, Peng Ning:
Computer Security - ESORICS 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings. Lecture Notes in Computer Science 5789, Springer 2009, ISBN 978-3-642-04443-4 [contents]