


default search action
16th ESORICS 2011: Leuven, Belgium
- Vijay Atluri, Claudia Díaz:

Computer Security - ESORICS 2011 - 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings. Lecture Notes in Computer Science 6879, Springer 2011, ISBN 978-3-642-23821-5
Wireless Security
- Nashad Ahmed Safa, Saikat Sarkar, Reihaneh Safavi-Naini, Majid Ghaderi:

Secure Localization Using Dynamic Verifiers. 1-20 - Diogo Mónica, Carlos Ribeiro

:
WiFiHop - Mitigating the Evil Twin Attack through Multi-hop Detection. 21-39 - Christina Pöpper

, Nils Ole Tippenhauer
, Boris Danev, Srdjan Capkun:
Investigation of Signal and Message Manipulations on the Wireless Channel. 40-59
Web Security I
- Yuchen Zhou, David Evans

:
Protecting Private Web Content from Embedded Scripts. 60-79 - Raymond Mui, Phyllis G. Frankl:

Preventing Web Application Injections with Complementary Character Coding. 80-99 - Philippe De Ryck, Lieven Desmet

, Wouter Joosen, Frank Piessens:
Automatic and Precise Client-Side Protection against CSRF Attacks. 100-116
Web Security II
- Gunnar Kreitz:

Timing Is Everything: The Importance of History Detection. 117-132 - Elie Bursztein, Baptiste Gourdin, John C. Mitchell:

Reclaiming the Blogosphere, TalkBack: A Secure LinkBack Protocol for Weblogs. 133-149 - Joel Weinberger, Prateek Saxena, Devdatta Akhawe, Matthew Finifter, Eui Chul Richard Shin, Dawn Song:

A Systematic Analysis of XSS Sanitization in Web Application Frameworks. 150-171
Forensics, Biometrics and Software Protection
- Nathan E. Rosenblum, Xiaojin Zhu, Barton P. Miller:

Who Wrote This Code? Identifying the Authors of Program Binaries. 172-189 - Marina Blanton

, Paolo Gasti:
Secure and Efficient Protocols for Iris and Fingerprint Identification. 190-209 - Zhi Wang, Jiang Ming, Chunfu Jia, Debin Gao

:
Linear Obfuscation to Combat Symbolic Execution. 210-226 - Yueqiang Cheng, Xuhua Ding

, Robert H. Deng
:
DriverGuard: A Fine-Grained Protection on I/O Flows. 227-244
Access Control
- Jason Crampton:

Time-Storage Trade-Offs for Cryptographically-Enforced Access Control. 245-261 - Steve Barker, Valerio Genovese:

Socially Constructed Trust for Distributed Authorization. 262-277 - Zhen Liu, Zhenfu Cao

, Qiong Huang, Duncan S. Wong, Tsz Hon Yuen
:
Fully Secure Multi-authority Ciphertext-Policy Attribute-Based Encryption without Random Oracles. 278-297
Cryptography and Protocol Analysis
- Dominique Schröder

:
How to Aggregate the CL Signature Scheme. 298-314 - Cas Cremers:

Key Exchange in IPsec Revisited: Formal Analysis of IKEv1 and IKEv2. 315-334 - David Bernhard, Véronique Cortier, Olivier Pereira, Ben Smyth, Bogdan Warinschi:

Adapting Helios for Provable Ballot Privacy. 335-354
Information Flow, Side Channels, and Vulnerability Analysis
- Billy Bob Brumley

, Nicola Tuveri
:
Remote Timing Attacks Are Still Practical. 355-371 - Arnar Birgisson, Andrei Sabelfeld:

Multi-run Security. 372-391 - Sören Bleikertz, Thomas Groß, Matthias Schunter, Konrad Eriksson:

Automated Information Flow Analysis of Virtualized Infrastructures. 392-415 - Massimiliano Albanese

, Sushil Jajodia
, Andrea Pugliese
, V. S. Subrahmanian:
Scalable Analysis of Attack Scenarios. 416-433
Usability, Ttrust, and Economics of Security and Privacy
- Alfred Kobsa

, Rishab Nithyanand, Gene Tsudik, Ersin Uzun
:
Usability of Display-Equipped RFID Tags for Security Purposes. 434-451 - Amir Herzberg

, Ronen Margulies:
Forcing Johnny to Login Safely - Long-Term User Study of Forcing and Training Login Mechanisms. 452-471 - Piero A. Bonatti

, Marco Faella, Clemente Galdi
, Luigi Sauro:
Towards a Mechanism for Incentivating Privacy. 472-488 - Alexander Ulrich, Ralph Holz, Peter Hauck, Georg Carle:

Investigating the OpenPGP Web of Trust. 489-507
Privacy I
- Dang Vinh Pham, Joss Wright, Dogan Kesdogan:

A Practical Complexity-Theoretic Analysis of Mix Systems. 508-527 - Ka Yang, Jinsheng Zhang, Wensheng Zhang, Daji Qiao:

A Light-Weight Solution to Preservation of Access Pattern Privacy in Un-trusted Clouds. 528-547 - Murtuza Jadliwala, Igor Bilogrevic, Jean-Pierre Hubaux:

Optimizing Mixing in Pervasive Networks: A Graph-Theoretic Perspective. 548-567
Privacy II
- Jens Hermans, Andreas Pashalidis, Frederik Vercauteren

, Bart Preneel
:
A New RFID Privacy Model. 568-587 - Michele Boreale

, Francesca Pampaloni, Michela Paolini:
Quantitative Information Flow, with a View. 588-606 - Xiao-yong Zhou, Bo Peng, Yong Fuga Li, Yangyi Chen, Haixu Tang, XiaoFeng Wang:

To Release or Not to Release: Evaluating Information Leaks in Aggregate Human-Genome Data. 607-627
Privacy III
- Nicholas L. Farnan, Adam J. Lee, Panos K. Chrysanthis, Ting Yu:

Don't Reveal My Intension: Protecting User Privacy Using Declarative Preferences during Distributed Query Processing. 628-647 - Sabrina De Capitani di Vimercati

, Sara Foresti
, Stefano Paraboschi
, Gerardo Pelosi
, Pierangela Samarati
:
Supporting Concurrency in Private Data Outsourcing. 648-664 - Hannes Federrath, Karl-Peter Fuchs, Dominik Herrmann, Christopher Piosecny:

Privacy-Preserving DNS: Analysis of Broadcast, Range Queries and Mix-Based Protection Methods. 665-683

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














