default search action
21st ESORICS 2016: Heraklion, Greece
- Ioannis G. Askoxylakis, Sotiris Ioannidis, Sokratis K. Katsikas, Catherine Meadows:
Computer Security - ESORICS 2016 - 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part II. Lecture Notes in Computer Science 9879, Springer 2016, ISBN 978-3-319-45740-6
Leakage Management and Obfuscation
- Andreas Zankl, Katja Miller, Johann Heyszl, Georg Sigl:
Towards Efficient Evaluation of a Time-Driven Cache Attack on Modern Processors. 3-19 - Michael T. Goodrich, Evgenios M. Kornaropoulos, Michael Mitzenmacher, Roberto Tamassia:
More Practical and Secure History-Independent Hash Tables. 20-38 - Brendan Sheridan, Micah Sherr:
On Manufacturing Resilient Opaque Constructs Against Static Analysis. 39-58
Secure Multiparty Computation
- Michel Abdalla, Mario Cornejo, Anca Nitulescu, David Pointcheval:
Robust Password-Protected Secret Sharing. 61-79 - Niklas Büscher, Andreas Holzer, Alina Weber, Stefan Katzenbeisser:
Compiling Low Depth Circuits for Practical Secure Computation. 80-98 - Xiao Wang, S. Dov Gordon, Allen McIntosh, Jonathan Katz:
Secure Computation of MIPS Machine Code. 99-117
Secure Logging
- Roel Peeters, Tobias Pulls:
Insynd: Improved Privacy-Preserving Transparency Logging. 121-139 - Benjamin Dowling, Felix Günther, Udyani Herath, Douglas Stebila:
Secure Logging Schemes and Certificate Transparency. 140-158
Economics of Security
- Aron Laszka, Mingyi Zhao, Jens Grossklags:
Banishing Misaligned Incentives for Validating Reports in Bug-Bounty Platforms. 161-178 - M. H. R. Khouzani, Pasquale Malacaria, Chris Hankin, Andrew Fielder, Fabrizio Smeraldi:
Efficient Numerical Frameworks for Multi-objective Cyber Security Planning. 179-197
E-voting and E-commerce
- Ilias Giechaskiel, Cas Cremers, Kasper Bonne Rasmussen:
On Bitcoin Security in the Presence of Broken Cryptographic Primitives. 201-222 - Siamak F. Shahandashti, Feng Hao:
DRE-ip: A Verifiable E-Voting Scheme Without Tallying Authorities. 223-240 - Myrto Arapinis, Véronique Cortier, Steve Kremer:
When Are Three Voters Enough for Privacy Properties? 241-260 - Waclaw Banasik, Stefan Dziembowski, Daniel Malinowski:
Efficient Zero-Knowledge Contingent Payments in Cryptocurrencies Without Scripts. 261-280
Security of the Internet of Things
- Andreea-Ina Radu, Flavio D. Garcia:
LeiA: A Lightweight Authentication Protocol for CAN. 283-300 - David J. Wu, Ankur Taly, Asim Shankar, Dan Boneh:
Privacy, Discovery, and Authentication for the Internet of Things. 301-319 - Florian Kohnhäuser, Stefan Katzenbeisser:
Secure Code Updates for Mesh Networked Commodity Low-End Embedded Devices. 320-338 - Kim Thuat Nguyen, Nouha Oualha, Maryline Laurent:
Authenticated Key Agreement Mediated by a Proxy Re-encryptor for the Internet of Things. 339-358
Data Privacy
- Joachim Biskup, Marcel Preuß:
Information Control by Policy-Based Relational Weakening Templates. 361-381 - Arthur Gervais, Hubert Ritzdorf, Mario Lucic, Vincent Lenders, Srdjan Capkun:
Quantifying Location Privacy Leakage from Transaction Prices. 382-405 - Valerie Fetzer, Jörn Müller-Quade, Tobias Nilges:
A Formal Treatment of Privacy in Video Data. 406-424
Security of Cyber-Physical Systems
- Marco Rocchetto, Nils Ole Tippenhauer:
On Attacker Models and Profiles for Cyber-Physical Systems. 427-449 - Vivek Nigam, Carolyn L. Talcott, Abraão Aires Urquiza:
Towards the Automated Verification of Cyber-Physical Security Protocols: Bounding the Number of Timed Intruders. 450-470 - Cristina Alcaraz, Javier López:
Safeguarding Structural Controllability in Cyber-Physical Control Systems. 471-489
Attacks
- Johanna Ullrich, Edgar R. Weippl:
The Beauty or The Beast? Attacking Rate Limits of the Xen Hypervisor. 493-511 - Nethanel Gelernter, Amir Herzberg:
Autocomplete Injection Attack. 512-530 - Mohamed Sabt, Jacques Traoré:
Breaking into the KeyStore: A Practical Forgery Attack Against Android KeyStore. 531-548
Attribute-Based Cryptography
- Jianting Ning, Zhenfu Cao, Xiaolei Dong, Junqing Gong, Jie Chen:
Traceable CP-ABE with Short Ciphertexts: How to Catch People Selling Decryption Devices on eBay Efficiently. 551-569 - Hui Cui, Robert H. Deng, Yingjiu Li, Baodong Qin:
Server-Aided Revocable Attribute-Based Encryption. 570-587 - Weiran Liu, Jianwei Liu, Qianhong Wu, Bo Qin, Kaitai Liang:
Online/Offline Public-Index Predicate Encryption for Fine-Grained Mobile Access Control. 588-605
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.