default search action
18th ESORICS 2013: Egham, UK
- Jason Crampton, Sushil Jajodia, Keith Mayes:
Computer Security - ESORICS 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings. Lecture Notes in Computer Science 8134, Springer 2013, ISBN 978-3-642-40202-9
Cryptography and Computation
- Ivan Damgård, Marcel Keller, Enrique Larraia, Valerio Pastro, Peter Scholl, Nigel P. Smart:
Practical Covertly Secure MPC for Dishonest Majority - Or: Breaking the SPDZ Limits. 1-18 - Jan Camenisch, Robert R. Enderlein, Victor Shoup:
Practical and Employable Protocols for UC-Secure Circuit Evaluation over ℤn. 19-37 - Michael Backes, Dario Fiore, Esfandiar Mohammadi:
Privacy-Preserving Accountable Computation. 38-56
Measurement and Evaluation
- Benjamin S. Lerner, Liam Elberty, Neal Poole, Shriram Krishnamurthi:
Verifying Web Browser Extensions' Compliance with Private-Browsing Mode. 57-74 - Xinshu Dong, Hong Hu, Prateek Saxena, Zhenkai Liang:
A Quantitative Evaluation of Privilege Separation in Web Browser Designs. 75-93 - Youngja Park, Christopher S. Gates, Stephen C. Gates:
Estimating Asset Sensitivity by Profiling Users. 94-110
Applications of Cryptography
- Giorgia Azzurra Marson, Bertram Poettering:
Practical Secure Logging: Seekable Sequential Key Generators. 111-128 - Jun Furukawa:
Request-Based Comparable Encryption. 129-146 - Lei Wei, Michael K. Reiter:
Ensuring File Authenticity in Private DFA Evaluation on Encrypted Files in the Cloud. 147-163
Code Analysis
- Dan Caselden, Alex Bazhanyuk, Mathias Payer, Stephen McCamant, Dawn Song:
HI-CFG: Construction by Binary Analysis and Application to Attack Polymorphism. 164-181 - Jonathan Crussell, Clint Gibler, Hao Chen:
AnDarwin: Scalable Detection of Semantically Similar Android Applications. 182-199 - Zhui Deng, Xiangyu Zhang, Dongyan Xu:
BISTRO: Binary Component Extraction and Embedding for Software Security Applications. 200-218
Network Security
- Amir Herzberg, Haya Schulmann:
Vulnerable Delegation of DNS Resolution. 219-236 - Jafar Haadi Jafarian, Ehab Al-Shaer, Qi Duan:
Formal Approach for Route Agility against Persistent Attackers. 237-254 - Yossi Gilad, Amir Herzberg:
Plug-and-Play IP Security - Anonymity Infrastructure instead of PKI. 255-272
Formal Models and Methods
- Aron Laszka, Benjamin Johnson, Pascal Schöttle, Jens Grossklags, Rainer Böhme:
Managing the Weakest Link - A Game-Theoretic Approach for the Mitigation of Insider Threats. 273-290 - Martin Gagné, Pascal Lafourcade, Yassine Lakhnech:
Automated Security Proofs for Almost-Universal Hash for MAC Verification. 291-308 - Max I. Kanovich, Tajana Ban Kirigin, Vivek Nigam, Andre Scedrov:
Bounded Memory Protocols and Progressing Collaborative Systems. 309-326 - Steve Kremer, Robert Künnemann, Graham Steel:
Universally Composable Key-Management. 327-344
Protocol Analysis
- Özgür Dagdelen, Marc Fischlin, Tommaso Gagliardoni, Giorgia Azzurra Marson, Arno Mittelbach, Cristina Onete:
A Cryptographic Analysis of OPACITY - (Extended Abstract). 345-362 - Bruno Conchinha, David A. Basin, Carlos Caleiro:
Symbolic Probabilistic Analysis of Off-Line Guessing. 363-380 - Colin Boyd, Cas Cremers, Michèle Feltz, Kenneth G. Paterson, Bertram Poettering, Douglas Stebila:
ASICS: Authenticated Key Exchange Security Incorporating Certification Systems. 381-399
Privacy Enhancing Models and Technologies
- Arjan Jeckmans, Andreas Peter, Pieter H. Hartel:
Efficient Privacy-Enhanced Familiarity-Based Recommender System. 400-417 - Dmitry Kononchuk, Zekeriya Erkin, Jan C. A. van der Lubbe, Reginald L. Lagendijk:
Privacy-Preserving User Data Oriented Services for Groups with Dynamic Participation. 418-442 - Mishari Al Mishari, Paolo Gasti, Gene Tsudik, Ekin Oguz:
Privacy-Preserving Matching of Community-Contributed Content. 443-462
E-voting and Privacy
- Ben Smyth, David Bernhard:
Ballot Secrecy and Ballot Independence Coincide. 463-480 - Edouard Cuvelier, Olivier Pereira, Thomas Peters:
Election Verifiability or Ballot Privacy: Do We Need to Choose? 481-498 - Naipeng Dong, Hugo Jonker, Jun Pang:
Enforcing Privacy in the Presence of Others: Notions, Formalisations and Relations. 499-516
Malware Detection
- Hugo Daniel Macedo, Tayssir Touili:
Mining Malware Specifications through Static Reachability Analysis. 517-535 - Jun Dai, Xiaoyan Sun, Peng Liu:
Patrol: Revealing Zero-Day Attack Paths through Network-Wide System Object Dependencies. 536-555 - Phani Vadrevu, Babak Rahbarinia, Roberto Perdisci, Kang Li, Manos Antonakakis:
Measuring and Detecting Malware Downloads in Live Network Traffic. 556-573
Access Control
- Andreas Griesmayer, Charles Morisset:
Automated Certification of Authorisation Policy Resistance. 574-591 - Jin Li, Xiaofeng Chen, Jingwei Li, Chunfu Jia, Jianfeng Ma, Wenjing Lou:
Fine-Grained Access Control System Based on Outsourced Attribute-Based Encryption. 592-609 - Michael Carl Tschantz, Anupam Datta, Jeannette M. Wing:
Purpose Restrictions on Information Use. 610-627 - Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Gerardo Pelosi, Pierangela Samarati:
Distributed Shuffling for Preserving Access Confidentiality. 628-645
Attacks
- Yossef Oren, Dvir Schirman, Avishai Wool:
Range Extension Attacks on Contactless Smart Cards. 646-663 - Marco Valerio Barbera, Vasileios P. Kemerlis, Vasilis Pappas, Angelos D. Keromytis:
CellFlood: Attacking Tor Onion Routers on the Cheap. 664-681 - Mathias Humbert, Théophile Studer, Matthias Grossglauser, Jean-Pierre Hubaux:
Nowhere to Hide: Navigating around Privacy in Online Social Networks. 682-699 - Shane S. Clark, Hossen Asiful Mustafa, Benjamin Ransford, Jacob Sorber, Kevin Fu, Wenyuan Xu:
Current Events: Identifying Webpages by Tapping the Electrical Outlet. 700-717
Language-Based Protection
- Deian Stefan, Pablo Buiras, Edward Z. Yang, Amit Levy, David Terei, Alejandro Russo, David Mazières:
Eliminating Cache-Based Timing Attacks with Instruction-Based Scheduling. 718-735 - Devdatta Akhawe, Frank Li, Warren He, Prateek Saxena, Dawn Song:
Data-Confined HTML5 Applications. 736-754 - Jinpeng Wei, Feng Zhu, Calton Pu:
KQguard: Binary-Centric Defense against Kernel Queue Injection Attacks. 755-774 - Limin Jia, Jassim Aljuraidan, Elli Fragkaki, Lujo Bauer, Michael Stroucken, Kazuhide Fukushima, Shinsaku Kiyomoto, Yutaka Miyake:
Run-Time Enforcement of Information-Flow Properties on Android - (Extended Abstract). 775-792
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.