:facetid:toc:\"db/conf/esorics/esorics2015-1.bht\"OK:facetid:toc:db/conf/esorics/esorics2015-1.bhtMichael Backes 0001Esfandiar MohammadiTim RuffingComputational Soundness for Interactive Primitives.ESORICS125-1452015Conference and Workshop Papersopenconf/esorics/0001MR1510.1007/978-3-319-24174-6_7https://doi.org/10.1007/978-3-319-24174-6_7https://dblp.org/rec/conf/esorics/0001MR15URL#3549977Gildas AvoineXavier CarpentCédric LauradouxInterleaving Cryptanalytic Time-Memory Trade-Offs on Non-uniform Distributions.ESORICS165-1842015Conference and Workshop Papersopenconf/esorics/AvoineCL1510.1007/978-3-319-24174-6_9https://doi.org/10.1007/978-3-319-24174-6_9https://dblp.org/rec/conf/esorics/AvoineCL15URL#3549984Alessandro BarenghiAlessandro Di FedericoGerardo PelosiStefano SanfilippoChallenging the Trustworthiness of PGP: Is the Web-of-Trust Tear-Proof?ESORICS429-4462015Conference and Workshop Papersopenconf/esorics/BarenghiFPS1510.1007/978-3-319-24174-6_22https://doi.org/10.1007/978-3-319-24174-6_22https://dblp.org/rec/conf/esorics/BarenghiFPS15URL#3549985Paul BeaumontNeil EvansMichael Huth 0001Tom PlantConfidence Analysis for Nuclear Arms Control: SMT Abstractions of Bayesian Belief Networks.ESORICS521-5402015Conference and Workshop Papersopenconf/esorics/BeaumontEHP1510.1007/978-3-319-24174-6_27https://doi.org/10.1007/978-3-319-24174-6_27https://dblp.org/rec/conf/esorics/BeaumontEHP15URL#3549987Fabrice BenhamoudaStephan KrennVadim LyubashevskyKrzysztof PietrzakEfficient Zero-Knowledge Proofs for Commitments from Learning with Errors over Rings.ESORICS305-3252015Conference and Workshop Papersopenconf/esorics/BenhamoudaKLP1510.1007/978-3-319-24174-6_16https://doi.org/10.1007/978-3-319-24174-6_16https://dblp.org/rec/conf/esorics/BenhamoudaKLP15URL#3549988Marina BlantonSiddharth SaraphOblivious Maximum Bipartite Matching Size Algorithm with Applications to Secure Fingerprint Identification.ESORICS384-4062015Conference and Workshop Papersopenconf/esorics/BlantonS1510.1007/978-3-319-24174-6_20https://doi.org/10.1007/978-3-319-24174-6_20https://dblp.org/rec/conf/esorics/BlantonS15URL#3549989Jonathan BootleAndrea CerulliPyrros ChaidosEssam GhadafiJens GrothChristophe Petit 0001Short Accountable Ring Signatures Based on DDH.ESORICS243-2652015Conference and Workshop Papersopenconf/esorics/BootleCCGGP1510.1007/978-3-319-24174-6_13https://doi.org/10.1007/978-3-319-24174-6_13https://dblp.org/rec/conf/esorics/BootleCCGGP15URL#3549990Ping Chen 0003Jun Xu 0024Zhiqiang LinDongyan XuBing MaoPeng Liu 0005A Practical Approach for Adaptive Data Structure Layout Randomization.ESORICS69-892015Conference and Workshop Papersopenconf/esorics/ChenXLXML1510.1007/978-3-319-24174-6_4https://doi.org/10.1007/978-3-319-24174-6_4https://dblp.org/rec/conf/esorics/ChenXLXML15URL#3549991Hind ChfoukaHamed NematiRoberto GuancialeMads DamPatrik EkdahlTrustworthy Prevention of Code Injection in Linux on Embedded Devices.ESORICS90-1072015Conference and Workshop Papersopenconf/esorics/ChfoukaNGDE1510.1007/978-3-319-24174-6_5https://doi.org/10.1007/978-3-319-24174-6_5https://dblp.org/rec/conf/esorics/ChfoukaNGDE15URL#3549992Daniel FettRalf KüstersGuido SchmitzAnalyzing the BrowserID SSO System with Primary Identity Providers Using an Expressive Model of the Web.ESORICS43-652015Conference and Workshop Papersopenconf/esorics/FettKS1510.1007/978-3-319-24174-6_3https://doi.org/10.1007/978-3-319-24174-6_3https://dblp.org/rec/conf/esorics/FettKS15URL#3550000Daniel GrussDavid BidnerStefan MangardPractical Memory Deduplication Attacks in Sandboxed Javascript.ESORICS108-1222015Conference and Workshop Papersopenconf/esorics/GrussBM1510.1007/978-3-319-24174-6_6https://doi.org/10.1007/978-3-319-24174-6_6https://dblp.org/rec/conf/esorics/GrussBM15URL#3550002Chaowen GuanKui Ren 0001Fangguo ZhangFlorian KerschbaumJia Yu 0005Symmetric-Key Based Proofs of Retrievability Supporting Public Verification.ESORICS203-2232015Conference and Workshop Papersopenconf/esorics/GuanRZKY1510.1007/978-3-319-24174-6_11https://doi.org/10.1007/978-3-319-24174-6_11https://dblp.org/rec/conf/esorics/GuanRZKY15URL#3550003Christian HanserMax RabkinDominique SchröderVerifiably Encrypted Signatures: Security Revisited and a New Construction.ESORICS146-1642015Conference and Workshop Papersopenconf/esorics/HanserRS1510.1007/978-3-319-24174-6_8https://doi.org/10.1007/978-3-319-24174-6_8https://dblp.org/rec/conf/esorics/HanserRS15URL#3550004Mario HeiderichMarcus NiemietzJörg SchwenkWaiting for CSP - Securing Legacy Web Applications with JSAgents.ESORICS23-422015Conference and Workshop Papersopenconf/esorics/HeiderichNS1510.1007/978-3-319-24174-6_2https://doi.org/10.1007/978-3-319-24174-6_2https://dblp.org/rec/conf/esorics/HeiderichNS15URL#3550006Tibor JagerJörg SchwenkJuraj SomorovskyPractical Invalid Curve Attacks on TLS-ECDH.ESORICS407-4252015Conference and Workshop Papersopenconf/esorics/JagerSS1510.1007/978-3-319-24174-6_21https://doi.org/10.1007/978-3-319-24174-6_21https://dblp.org/rec/conf/esorics/JagerSS15URL#3550011Aggelos KiayiasQiang Tang 0005Making Any Identity-Based Encryption Accountable, Efficiently.ESORICS326-3462015Conference and Workshop Papersopenconf/esorics/KiayiasT1510.1007/978-3-319-24174-6_17https://doi.org/10.1007/978-3-319-24174-6_17https://dblp.org/rec/conf/esorics/KiayiasT15URL#3550013Aron LaszkaJens GrossklagsShould Cyber-Insurance Providers Invest in Software Security?ESORICS483-5022015Conference and Workshop Papersopenconf/esorics/LaszkaG1510.1007/978-3-319-24174-6_25https://doi.org/10.1007/978-3-319-24174-6_25https://dblp.org/rec/conf/esorics/LaszkaG15URL#3550018Junrong LiuYu Yu 0001François-Xavier StandaertZheng Guo 0001Dawu GuWei SunYijie GeXinjun XieSmall Tweaks Do Not Help: Differential Power Analysis of MILENAGE Implementations in 3G/4G USIM Cards.ESORICS468-4802015Conference and Workshop Papersopenconf/esorics/LiuYSGGSGX1510.1007/978-3-319-24174-6_24https://doi.org/10.1007/978-3-319-24174-6_24https://dblp.org/rec/conf/esorics/LiuYSGGSGX15URL#3550020Swee-Won LoZhuo WeiRobert H. DengXuhua DingOn Security of Content-Based Video Stream Authentication.ESORICS366-3832015Conference and Workshop Papersopenconf/esorics/LoWDD1510.1007/978-3-319-24174-6_19https://doi.org/10.1007/978-3-319-24174-6_19https://dblp.org/rec/conf/esorics/LoWDD15URL#3550021Heiko MantelArtem StarostinTransforming Out Timing Leaks, More or Less.ESORICS447-4672015Conference and Workshop Papersopenconf/esorics/MantelS1510.1007/978-3-319-24174-6_23https://doi.org/10.1007/978-3-319-24174-6_23https://dblp.org/rec/conf/esorics/MantelS15URL#3550023Kazuhiko MinematsuEfficient Message Authentication Codes with Combinatorial Group Testing.ESORICS185-2022015Conference and Workshop Papersopenconf/esorics/Minematsu1510.1007/978-3-319-24174-6_10https://doi.org/10.1007/978-3-319-24174-6_10https://dblp.org/rec/conf/esorics/Minematsu15URL#3550025Oscar García MorchonRonald RietmanSahil SharmaLudo TolhuizenJose Luis Torre-ArceDTLS-HIMMO: Achieving DTLS Certificate Security with Symmetric Key Overhead.ESORICS224-2422015Conference and Workshop Papersopenconf/esorics/MorchonRSTT1510.1007/978-3-319-24174-6_12https://doi.org/10.1007/978-3-319-24174-6_12https://dblp.org/rec/conf/esorics/MorchonRSTT15URL#3550026Jan Tobias MühlbergJob NoormanFrank PiessensLightweight and Flexible Trust Assessment Modules for the Internet of Things.ESORICS503-5202015Conference and Workshop Papersopenconf/esorics/MuhlbergNP1510.1007/978-3-319-24174-6_26https://doi.org/10.1007/978-3-319-24174-6_26https://dblp.org/rec/conf/esorics/MuhlbergNP15URL#3550027Baodong QinRobert H. DengYingjiu LiShengli Liu 0001Server-Aided Revocable Identity-Based Encryption.ESORICS286-3042015Conference and Workshop Papersopenconf/esorics/QinDLL1510.1007/978-3-319-24174-6_15https://doi.org/10.1007/978-3-319-24174-6_15https://dblp.org/rec/conf/esorics/QinDLL15URL#3550041Haya SchulmannMichael WaidnerTowards Security of Internet Naming Infrastructure.ESORICS3-222015Conference and Workshop Papersopenconf/esorics/ShulmanW1510.1007/978-3-319-24174-6_1https://doi.org/10.1007/978-3-319-24174-6_1https://dblp.org/rec/conf/esorics/ShulmanW15URL#3550049Rupeng YangQiuliang XuYongbin ZhouRui Zhang 0002Chengyu HuZuoxia YuUpdatable Hash Proof System and Its Applications.ESORICS266-2852015Conference and Workshop Papersopenconf/esorics/YangXZZHY1510.1007/978-3-319-24174-6_14https://doi.org/10.1007/978-3-319-24174-6_14https://dblp.org/rec/conf/esorics/YangXZZHY15URL#3550061Xun YiFeng Hao 0001Liqun Chen 0002Joseph K. LiuPractical Threshold Password-Authenticated Secret Sharing Protocol.ESORICS347-3652015Conference and Workshop Papersopenconf/esorics/YiHCL1510.1007/978-3-319-24174-6_18https://doi.org/10.1007/978-3-319-24174-6_18https://dblp.org/rec/conf/esorics/YiHCL15URL#3550062Günther PernulPeter Y. A. RyanEdgar R. WeipplComputer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part IESORICSLecture Notes in Computer Science9326Springer2015Editorshipconf/esorics/2015-110.1007/978-3-319-24174-6https://doi.org/10.1007/978-3-319-24174-6https://dblp.org/rec/conf/esorics/2015-1URL#3667613