


default search action
15th ESORICS 2010: Athens, Greece
- Dimitris Gritzalis, Bart Preneel, Marianthi Theoharidou

:
Computer Security - ESORICS 2010, 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings. Lecture Notes in Computer Science 6345, Springer 2010, ISBN 978-3-642-15496-6
RFID and Privacy
- Robert H. Deng

, Yingjiu Li, Moti Yung, Yunlei Zhao:
A New Framework for RFID Privacy. 1-18 - Rishab Nithyanand, Gene Tsudik, Ersin Uzun

:
Readers Behaving Badly - Reader Revocation in PKI-Based RFID Systems. 19-36 - Elli Androulaki, Binh Vo, Steven M. Bellovin:

Privacy-Preserving, Taxable Bank Accounts. 37-54 - Morten Dahl, Stéphanie Delaune, Graham Steel:

Formal Analysis of Privacy for Vehicular Mix-Zones. 55-70
Software Security
- Chao Zhang, Tielei Wang, Tao Wei, Yu Chen, Wei Zou:

IntPatch: Automatically Fix Integer-Overflow-to-Buffer-Overflow Vulnerability at Compile-Time. 71-86 - Jay Ligatti, Srikar Reddy:

A Theory of Runtime Enforcement, with Results. 87-100 - Laurent Hubert, Thomas P. Jensen, Vincent Monfort, David Pichardie:

Enforcing Secure Object Initialization in Java. 101-115 - Heiko Mantel, Henning Sudbrock:

Flexible Scheduler-Independent Security. 116-133
Cryptographic Protocols
- Octavian Catrina

, Sebastiaan de Hoogh:
Secure Multiparty Linear Programming Using Fixed-Point Arithmetic. 134-150 - José Bacelar Almeida

, Endre Bangerter, Manuel Barbosa
, Stephan Krenn, Ahmad-Reza Sadeghi, Thomas Schneider
:
A Certifying Compiler for Zero-Knowledge Proofs of Knowledge Based on Sigma-Protocols. 151-167 - Joseph K. Liu

, Man Ho Au
, Willy Susilo
, Jianying Zhou
:
Short Generic Transformation to Strongly Unforgeable Signature in the Standard Model. 168-181 - Wenjuan Xu, Gail-Joon Ahn

, Hongxin Hu, Xinwen Zhang, Jean-Pierre Seifert:
DR@FT: Efficient Remote Attestation Framework for Dynamic Systems. 182-198
Traffic Analysis
- Liming Lu, Ee-Chien Chang

, Mun Choon Chan:
Website Fingerprinting and Identification Using Ordered Feature Sequences. 199-214 - Artur Janc, Lukasz Olejnik:

Web Browser History Detection as a Real-World Privacy Threat. 215-231 - Xiapu Luo

, Junjie Zhang, Roberto Perdisci, Wenke Lee:
On the Secrecy of Spread-Spectrum Flow Watermarks. 232-248 - Sambuddho Chakravarty, Angelos Stavrou

, Angelos D. Keromytis:
Traffic Analysis against Low-Latency Anonymity Networks Using Available Bandwidth Estimation. 249-267
End-User Security
- Guang Xiang, Bryan A. Pendleton, Jason I. Hong

, Carolyn P. Rosé
:
A Hierarchical Adaptive Probabilistic Approach for Zero Hour Phish Detection. 268-285 - Hristo Bojinov, Elie Bursztein, Xavier Boyen, Dan Boneh:

Kamouflage: Loss-Resistant Password Management. 286-302
Formal Analysis
- Santiago Escobar

, Catherine Meadows, José Meseguer, Sonia Santiago
:
Sequential Protocol Composition in Maude-NPA. 303-318 - Tien Tuan Anh Dinh, Mark Ryan

:
Verifying Security Property of Peer-to-Peer Systems Using CSP. 319-339 - David A. Basin, Cas Cremers:

Modeling and Analyzing Security in the Presence of Compromising Adversaries. 340-356 - Hirotoshi Yasuoka, Tachio Terauchi

:
On Bounding Problems of Quantitative Information Flow. 357-372
E-voting and Broadcast
- Sven Heiberg, Helger Lipmaa

, Filip van Laenen:
On E-Vote Integrity in the Case of Malicious Voter Computers. 373-388 - Steve Kremer

, Mark Ryan
, Ben Smyth:
Election Verifiability in Electronic Voting Protocols. 389-404 - James Heather, Peter Y. A. Ryan

, Vanessa Teague:
Pretty Good Democracy for More Expressive Voting Schemes. 405-423 - Marina Blanton

, Keith B. Frikken:
Efficient Multi-dimensional Key Management in Broadcast Services. 424-440
Authentication, Access Control, Authorization and Attestation
- Jan Meier, Dieter Gollmann:

Caught in the Maze of Security Standards. 441-454 - Mikhail I. Gofman, Ruiqi Luo, Ping Yang:

User-Role Reachability Analysis of Evolving Administrative Role Based Access Control. 455-471 - Jason Crampton, Michael Huth:

An Authorization Framework Resilient to Policy Evaluation Failures. 472-487 - Alptekin Küpçü

, Anna Lysyanskaya:
Optimistic Fair Exchange with Multiple Arbiters. 488-507
Anonymity and Unlinkability
- Michael Backes, Goran Doychev, Markus Dürmuth

, Boris Köpf:
Speaker Recognition in Encrypted Voice Streams. 508-523 - Andreas Pashalidis, Stefan Schiffner:

Evaluating Adversarial Partitions. 524-539 - Claudio A. Ardagna

, Sushil Jajodia
, Pierangela Samarati
, Angelos Stavrou
:
Providing Mobile Users' Anonymity in Hybrid Networks. 540-557 - Ferucio Laurentiu Tiplea, Loredana Vamanu, Cosmin Vârlan:

Complexity of Anonymity for Security Protocols. 558-572
Network Security and Economics
- Lingyu Wang, Sushil Jajodia

, Anoop Singhal, Steven Noel:
k-Zero Day Safety: Measuring the Security Risk of Networks against Unknown Attacks. 573-587 - Benjamin Johnson, Jens Grossklags, Nicolas Christin

, John Chuang
:
Are Security Experts Useful? Bayesian Nash Equilibria for Network Security Games with Limited Information. 588-606 - Michael Backes, Oana Ciobotaru, Anton Krohmer:

RatFish: A File Sharing Protocol Provably Secure against Rational Users. 607-625 - Nizar Kheir, Nora Cuppens-Boulahia, Frédéric Cuppens, Hervé Debar

:
A Service Dependency Model for Cost-Sensitive Intrusion Response. 626-642
Secure Update, DOS and Intrustion Detection
- Daniele Perito, Gene Tsudik:

Secure Code Update for Embedded Devices via Proofs of Secure Erasure. 643-662 - Alexandros Kapravelos, Iasonas Polakis, Elias Athanasopoulos, Sotiris Ioannidis, Evangelos P. Markatos:

D(e|i)aling with VoIP: Robust Prevention of DIAL Attacks. 663-678 - Ghassan Karame, Srdjan Capkun:

Low-Cost Client Puzzles Based on Modular Exponentiation. 679-697 - Arnur G. Tokhtabayev, Victor A. Skormin, Andrey M. Dolgikh:

Expressive, Efficient and Obfuscation Resilient Behavior Based IDS. 698-715

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














