


default search action
23rd ESORICS 2018: Barcelona, Spain
- Javier López, Jianying Zhou, Miguel Soriano:
Computer Security - 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part II. Lecture Notes in Computer Science 11099, Springer 2018, ISBN 978-3-319-98988-4
Mobile Security
- Prabhakaran Kasinathan, Jorge Cuéllar:
Workflow-Aware Security of Integrated Mobility Services. 3-19 - Kaiming Fang, Guanhua Yan:
Emulation-Instrumented Fuzz Testing of 4G/LTE Android Mobile Devices Guided by Reinforcement Learning. 20-40 - Sascha Groß
, Abhishek Tiwari
, Christian Hammer
:
PIAnalyzer: A Precise Approach for PendingIntent Vulnerability Analysis. 41-59 - Christof Ferreira Torres
, Hugo Jonker
:
Investigating Fingerprinters and Fingerprinting-Alike Behaviour of Android Applications. 60-80
Database and Web Security
- Jianfeng Wang
, Xiaofeng Chen, Shifeng Sun, Joseph K. Liu, Man Ho Au, Zhi-Hui Zhan:
Towards Efficient Verifiable Conjunctive Keyword Search for Large Encrypted Database. 83-100 - Xingchen Wang
, Yunlei Zhao
:
Order-Revealing Encryption: File-Injection Attack and Forward Security. 101-121 - Wenhao Wang, Benjamin Ferrell, Xiaoyang Xu, Kevin W. Hamlen, Shuang Hao:
SEISMIC: SEcure In-lined Script Monitors for Interrupting Cryptojacks. 122-142 - Haitao Xu, Zhao Li
, Chen Chu, Yuanmi Chen, Yifan Yang
, Haifeng Lu, Haining Wang, Angelos Stavrou
:
Detecting and Characterizing Web Bot Traffic in a Large E-commerce Marketplace. 143-163
Cloud Security
- Jianghua Liu, Jinhua Ma, Wanlei Zhou
, Yang Xiang, Xinyi Huang:
Dissemination of Authenticated Tree-Structured Data with Privacy Protection and Fine-Grained Control in Outsourced Databases. 167-186 - Jin Li, Heng Ye, Wei Wang, Wenjing Lou, Y. Thomas Hou
, Jiqiang Liu, Rongxing Lu:
Efficient and Secure Outsourcing of Differentially Private Data Publication. 187-206 - Sarvar Patel, Giuseppe Persiano, Kevin Yeo:
Symmetric Searchable Encryption with Sharing and Unsharing. 207-227 - Cong Zuo, Shifeng Sun, Joseph K. Liu, Jun Shao, Josef Pieprzyk
:
Dynamic Searchable Symmetric Encryption Schemes Supporting Range Queries with Forward (and Backward) Security. 228-246
Applied Crypto (I)
- Takanori Isobe, Kazuhiko Minematsu:
Breaking Message Integrity of an End-to-End Encryption Scheme of LINE. 249-268 - Jihye Kim
, Seunghwa Lee, Jiwon Lee, Hyunok Oh:
Scalable Wildcarded Identity-Based Encryption. 269-287 - Benoît Libert, Thomas Peters, Chen Qian
:
Logarithmic-Size Ring Signatures with Tight Security from the DDH Assumption. 288-308 - Karol Gotfryd
, Pawel Lorek
, Filip Zagórski
:
RiffleScrambler - A Memory-Hard Password Storing Function. 309-328
Privacy (II)
- Sébastien Canard, David Pointcheval, Quentin Santos, Jacques Traoré:
Practical Strategy-Resistant Privacy-Preserving Elections. 331-349 - Gergei Bana, Rohit Chadha, Ajay Kumar Eeralla:
Formal Analysis of Vote Privacy Using Computationally Complete Symbolic Attacker. 350-372 - Xueou Wang, Xiaolu Hou
, Ruben Rios
, Per A. Hallgren, Nils Ole Tippenhauer
, Martín Ochoa:
Location Proximity Attacks Against Mobile Targets: Analytical Bounds and Attacker Strategies. 373-392
Multi-party Computation
- Hiraku Morita
, Nuttapong Attrapadung, Tadanori Teruya, Satsuya Ohata, Koji Nuida
, Goichiro Hanaoka:
Constant-Round Client-Aided Secure Comparison Protocol. 395-415 - Niklas Büscher, Alina Weber, Stefan Katzenbeisser:
Towards Practical RAM Based Secure Computation. 416-437 - Marina Blanton
, Myoungin Jeong:
Improved Signature Schemes for Secure Multi-party Computation with Certified Inputs. 438-460
SDN Security
- Amir Alimohammadifar, Suryadipta Majumdar, Taous Madi, Yosr Jarraya, Makan Pourzandi, Lingyu Wang, Mourad Debbabi
:
Stealthy Probing-Based Verification (SPV): An Active Approach to Defending Software Defined Networks Against Topology Poisoning Attacks. 463-484 - Nicolae Paladi, Linus Karlsson, Khalid Elbashir:
Trust Anchors in Software Defined Networks. 485-504
Applied Crypto (II)
- Hui Ma, Rui Zhang, Guomin Yang
, Zishuai Song
, Shuzhou Sun, Yuting Xiao:
Concessive Online/Offline Attribute Based Encryption with Cryptographic Reverse Firewalls - Secure and Efficient Fine-Grained Access Control on Corrupted Machines. 507-526 - Junzuo Lai, Qiang Tang
:
Making Any Attribute-Based Encryption Accountable, Efficiently. 527-547 - Yan Michalevsky, Marc Joye:
Decentralized Policy-Hiding ABE with Receiver Privacy. 548-567

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.