


default search action
18th ESORICS 2013: Egham, UK
- Jason Crampton, Sushil Jajodia

, Keith Mayes:
Computer Security - ESORICS 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings. Lecture Notes in Computer Science 8134, Springer 2013, ISBN 978-3-642-40202-9
Cryptography and Computation
- Ivan Damgård, Marcel Keller, Enrique Larraia

, Valerio Pastro, Peter Scholl
, Nigel P. Smart:
Practical Covertly Secure MPC for Dishonest Majority - Or: Breaking the SPDZ Limits. 1-18 - Jan Camenisch, Robert R. Enderlein, Victor Shoup:

Practical and Employable Protocols for UC-Secure Circuit Evaluation over ℤn. 19-37 - Michael Backes, Dario Fiore, Esfandiar Mohammadi:

Privacy-Preserving Accountable Computation. 38-56
Measurement and Evaluation
- Benjamin S. Lerner, Liam Elberty, Neal Poole, Shriram Krishnamurthi

:
Verifying Web Browser Extensions' Compliance with Private-Browsing Mode. 57-74 - Xinshu Dong, Hong Hu, Prateek Saxena, Zhenkai Liang

:
A Quantitative Evaluation of Privilege Separation in Web Browser Designs. 75-93 - Youngja Park, Christopher S. Gates, Stephen C. Gates:

Estimating Asset Sensitivity by Profiling Users. 94-110
Applications of Cryptography
- Giorgia Azzurra Marson, Bertram Poettering:

Practical Secure Logging: Seekable Sequential Key Generators. 111-128 - Jun Furukawa:

Request-Based Comparable Encryption. 129-146 - Lei Wei, Michael K. Reiter:

Ensuring File Authenticity in Private DFA Evaluation on Encrypted Files in the Cloud. 147-163
Code Analysis
- Dan Caselden, Alex Bazhanyuk, Mathias Payer, Stephen McCamant, Dawn Song:

HI-CFG: Construction by Binary Analysis and Application to Attack Polymorphism. 164-181 - Jonathan Crussell, Clint Gibler, Hao Chen

:
AnDarwin: Scalable Detection of Semantically Similar Android Applications. 182-199 - Zhui Deng, Xiangyu Zhang, Dongyan Xu:

BISTRO: Binary Component Extraction and Embedding for Software Security Applications. 200-218
Network Security
- Amir Herzberg

, Haya Schulmann:
Vulnerable Delegation of DNS Resolution. 219-236 - Jafar Haadi Jafarian, Ehab Al-Shaer, Qi Duan:

Formal Approach for Route Agility against Persistent Attackers. 237-254 - Yossi Gilad, Amir Herzberg

:
Plug-and-Play IP Security - Anonymity Infrastructure instead of PKI. 255-272
Formal Models and Methods
- Aron Laszka

, Benjamin Johnson, Pascal Schöttle, Jens Grossklags, Rainer Böhme:
Managing the Weakest Link - A Game-Theoretic Approach for the Mitigation of Insider Threats. 273-290 - Martin Gagné, Pascal Lafourcade

, Yassine Lakhnech:
Automated Security Proofs for Almost-Universal Hash for MAC Verification. 291-308 - Max I. Kanovich, Tajana Ban Kirigin

, Vivek Nigam, Andre Scedrov
:
Bounded Memory Protocols and Progressing Collaborative Systems. 309-326 - Steve Kremer

, Robert Künnemann, Graham Steel:
Universally Composable Key-Management. 327-344
Protocol Analysis
- Özgür Dagdelen, Marc Fischlin, Tommaso Gagliardoni, Giorgia Azzurra Marson, Arno Mittelbach, Cristina Onete:

A Cryptographic Analysis of OPACITY - (Extended Abstract). 345-362 - Bruno Conchinha, David A. Basin, Carlos Caleiro

:
Symbolic Probabilistic Analysis of Off-Line Guessing. 363-380 - Colin Boyd, Cas Cremers, Michèle Feltz, Kenneth G. Paterson, Bertram Poettering, Douglas Stebila

:
ASICS: Authenticated Key Exchange Security Incorporating Certification Systems. 381-399
Privacy Enhancing Models and Technologies
- Arjan Jeckmans, Andreas Peter, Pieter H. Hartel

:
Efficient Privacy-Enhanced Familiarity-Based Recommender System. 400-417 - Dmitry Kononchuk, Zekeriya Erkin

, Jan C. A. van der Lubbe, Reginald L. Lagendijk:
Privacy-Preserving User Data Oriented Services for Groups with Dynamic Participation. 418-442 - Mishari Al Mishari, Paolo Gasti, Gene Tsudik, Ekin Oguz:

Privacy-Preserving Matching of Community-Contributed Content. 443-462
E-voting and Privacy
- Ben Smyth, David Bernhard:

Ballot Secrecy and Ballot Independence Coincide. 463-480 - Edouard Cuvelier, Olivier Pereira, Thomas Peters:

Election Verifiability or Ballot Privacy: Do We Need to Choose? 481-498 - Naipeng Dong

, Hugo Jonker, Jun Pang:
Enforcing Privacy in the Presence of Others: Notions, Formalisations and Relations. 499-516
Malware Detection
- Hugo Daniel Macedo

, Tayssir Touili:
Mining Malware Specifications through Static Reachability Analysis. 517-535 - Jun Dai

, Xiaoyan Sun, Peng Liu:
Patrol: Revealing Zero-Day Attack Paths through Network-Wide System Object Dependencies. 536-555 - Phani Vadrevu, Babak Rahbarinia, Roberto Perdisci, Kang Li, Manos Antonakakis:

Measuring and Detecting Malware Downloads in Live Network Traffic. 556-573
Access Control
- Andreas Griesmayer, Charles Morisset:

Automated Certification of Authorisation Policy Resistance. 574-591 - Jin Li, Xiaofeng Chen, Jingwei Li, Chunfu Jia, Jianfeng Ma, Wenjing Lou:

Fine-Grained Access Control System Based on Outsourced Attribute-Based Encryption. 592-609 - Michael Carl Tschantz, Anupam Datta, Jeannette M. Wing:

Purpose Restrictions on Information Use. 610-627 - Sabrina De Capitani di Vimercati

, Sara Foresti
, Stefano Paraboschi
, Gerardo Pelosi
, Pierangela Samarati
:
Distributed Shuffling for Preserving Access Confidentiality. 628-645
Attacks
- Yossef Oren

, Dvir Schirman, Avishai Wool
:
Range Extension Attacks on Contactless Smart Cards. 646-663 - Marco Valerio Barbera, Vasileios P. Kemerlis

, Vasilis Pappas, Angelos D. Keromytis:
CellFlood: Attacking Tor Onion Routers on the Cheap. 664-681 - Mathias Humbert, Théophile Studer, Matthias Grossglauser, Jean-Pierre Hubaux:

Nowhere to Hide: Navigating around Privacy in Online Social Networks. 682-699 - Shane S. Clark, Hossen Asiful Mustafa

, Benjamin Ransford, Jacob Sorber, Kevin Fu, Wenyuan Xu:
Current Events: Identifying Webpages by Tapping the Electrical Outlet. 700-717
Language-Based Protection
- Deian Stefan, Pablo Buiras, Edward Z. Yang, Amit Levy, David Terei, Alejandro Russo

, David Mazières:
Eliminating Cache-Based Timing Attacks with Instruction-Based Scheduling. 718-735 - Devdatta Akhawe, Frank Li, Warren He, Prateek Saxena, Dawn Song:

Data-Confined HTML5 Applications. 736-754 - Jinpeng Wei, Feng Zhu, Calton Pu:

KQguard: Binary-Centric Defense against Kernel Queue Injection Attacks. 755-774 - Limin Jia

, Jassim Aljuraidan, Elli Fragkaki, Lujo Bauer
, Michael Stroucken, Kazuhide Fukushima
, Shinsaku Kiyomoto, Yutaka Miyake:
Run-Time Enforcement of Information-Flow Properties on Android - (Extended Abstract). 775-792

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














