


default search action
20th ESORICS 2015: Vienna, Austria
- Günther Pernul, Peter Y. A. Ryan

, Edgar R. Weippl:
Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I. Lecture Notes in Computer Science 9326, Springer 2015, ISBN 978-3-319-24173-9
Networks and Web Security
- Haya Schulmann, Michael Waidner

:
Towards Security of Internet Naming Infrastructure. 3-22 - Mario Heiderich, Marcus Niemietz, Jörg Schwenk:

Waiting for CSP - Securing Legacy Web Applications with JSAgents. 23-42 - Daniel Fett, Ralf Küsters, Guido Schmitz

:
Analyzing the BrowserID SSO System with Primary Identity Providers Using an Expressive Model of the Web. 43-65
System Security
- Ping Chen, Jun Xu, Zhiqiang Lin, Dongyan Xu, Bing Mao, Peng Liu:

A Practical Approach for Adaptive Data Structure Layout Randomization. 69-89 - Hind Chfouka, Hamed Nemati

, Roberto Guanciale
, Mads Dam, Patrik Ekdahl:
Trustworthy Prevention of Code Injection in Linux on Embedded Devices. 90-107 - Daniel Gruss

, David Bidner, Stefan Mangard
:
Practical Memory Deduplication Attacks in Sandboxed Javascript. 108-122
Cryptography
- Michael Backes, Esfandiar Mohammadi, Tim Ruffing

:
Computational Soundness for Interactive Primitives. 125-145 - Christian Hanser, Max Rabkin, Dominique Schröder

:
Verifiably Encrypted Signatures: Security Revisited and a New Construction. 146-164 - Gildas Avoine, Xavier Carpent

, Cédric Lauradoux:
Interleaving Cryptanalytic Time-Memory Trade-Offs on Non-uniform Distributions. 165-184 - Kazuhiko Minematsu:

Efficient Message Authentication Codes with Combinatorial Group Testing. 185-202 - Chaowen Guan

, Kui Ren
, Fangguo Zhang
, Florian Kerschbaum, Jia Yu:
Symmetric-Key Based Proofs of Retrievability Supporting Public Verification. 203-223 - Oscar García Morchon, Ronald Rietman, Sahil Sharma

, Ludo Tolhuizen, Jose Luis Torre-Arce:
DTLS-HIMMO: Achieving DTLS Certificate Security with Symmetric Key Overhead. 224-242 - Jonathan Bootle

, Andrea Cerulli, Pyrros Chaidos, Essam Ghadafi, Jens Groth
, Christophe Petit
:
Short Accountable Ring Signatures Based on DDH. 243-265 - Rupeng Yang, Qiuliang Xu, Yongbin Zhou, Rui Zhang, Chengyu Hu, Zuoxia Yu:

Updatable Hash Proof System and Its Applications. 266-285 - Baodong Qin, Robert H. Deng

, Yingjiu Li, Shengli Liu:
Server-Aided Revocable Identity-Based Encryption. 286-304 - Fabrice Benhamouda

, Stephan Krenn, Vadim Lyubashevsky, Krzysztof Pietrzak:
Efficient Zero-Knowledge Proofs for Commitments from Learning with Errors over Rings. 305-325 - Aggelos Kiayias, Qiang Tang

:
Making Any Identity-Based Encryption Accountable, Efficiently. 326-346 - Xun Yi, Feng Hao

, Liqun Chen
, Joseph K. Liu:
Practical Threshold Password-Authenticated Secret Sharing Protocol. 347-365 - Swee-Won Lo, Zhuo Wei, Robert H. Deng

, Xuhua Ding
:
On Security of Content-Based Video Stream Authentication. 366-383 - Marina Blanton

, Siddharth Saraph:
Oblivious Maximum Bipartite Matching Size Algorithm with Applications to Secure Fingerprint Identification. 384-406 - Tibor Jager, Jörg Schwenk, Juraj Somorovsky:

Practical Invalid Curve Attacks on TLS-ECDH. 407-425
Crypto Applications and Attacks
- Alessandro Barenghi

, Alessandro Di Federico, Gerardo Pelosi
, Stefano Sanfilippo:
Challenging the Trustworthiness of PGP: Is the Web-of-Trust Tear-Proof? 429-446 - Heiko Mantel, Artem Starostin:

Transforming Out Timing Leaks, More or Less. 447-467 - Junrong Liu, Yu Yu, François-Xavier Standaert

, Zheng Guo, Dawu Gu, Wei Sun, Yijie Ge, Xinjun Xie:
Small Tweaks Do Not Help: Differential Power Analysis of MILENAGE Implementations in 3G/4G USIM Cards. 468-480
Risk Analysis
- Aron Laszka

, Jens Grossklags:
Should Cyber-Insurance Providers Invest in Software Security? 483-502 - Jan Tobias Mühlberg

, Job Noorman, Frank Piessens:
Lightweight and Flexible Trust Assessment Modules for the Internet of Things. 503-520 - Paul Beaumont, Neil Evans, Michael Huth, Tom Plant:

Confidence Analysis for Nuclear Arms Control: SMT Abstractions of Bayesian Belief Networks. 521-540

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














