


default search action
27th ESORICS 2022: Copenhagen, Denmark - Part II
- Vijayalakshmi Atluri

, Roberto Di Pietro
, Christian Damsgaard Jensen
, Weizhi Meng
:
Computer Security - ESORICS 2022 - 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26-30, 2022, Proceedings, Part II. Lecture Notes in Computer Science 13555, Springer 2022, ISBN 978-3-031-17145-1
Anonymity
- Isabel Wagner

:
A Machine Learning Approach to Detect Differential Treatment of Anonymous Users. 3-23 - Bill Moriarty, Chun-Fu (Richard) Chen, Shaohan Hu, Sean J. Moran, Marco Pistoia, Vincenzo Piuri, Pierangela Samarati:

Utility-Preserving Biometric Information Anonymization. 24-41 - Erin Kenney, Qiang Tang

, Chase Wu:
Anonymous Traceback for End-to-End Encryption. 42-62
Cloud Security
- Willy Susilo

, Yannan Li
, Fuchun Guo
, Jianchang Lai
, Ge Wu
:
Public Cloud Data Auditing Revisited: Removing the Tradeoff Between Proof Size and Storage Cost. 65-85 - Yubo Zheng, Peng Xu

, Wei Wang, Tianyang Chen, Willy Susilo
, Kaitai Liang, Hai Jin:
DEKS: A Secure Cloud-Based Searchable Service Can Make Attackers Pay. 86-104 - Xingkai Wang

, Zhenfu Cao
, Zhen Liu
, Kaitai Liang
:
Lighter is Better: A Lighter Multi-client Verifiable Outsourced Computation with Hybrid Homomorphic Encryption. 105-125 - Peiyang Li, Ye Wang

, Zhuotao Liu
, Ke Xu, Qian Wang, Chao Shen, Qi Li:
Verifying the Quality of Outsourced Training on Clouds. 126-144 - Sunwoo Jang, Somin Song, Byungchul Tak, Sahil Suneja, Michael V. Le, Chuan Yue, Dan Williams:

SecQuant: Quantifying Container System Call Exposure. 145-166 - Martin Schwarzl, Pietro Borrello, Andreas Kogler, Kenton Varda, Thomas Schuster, Michael Schwarz, Daniel Gruss:

Robust and Scalable Process Isolation Against Spectre in the Cloud. 167-186
Access Control
- Mohammad Nur Nobi, Ram Krishnan, Yufei Huang, Ravi S. Sandhu:

Administration of Machine Learning Based Access Control. 189-210 - François Hublet

, David A. Basin
, Srdan Krstic
:
Real-Time Policy Enforcement with Metric First-Order Temporal Logic. 211-232 - Abdulla Aldoseri, David F. Oswald

, Robert Chiper:
A Tale of Four Gates - Privilege Escalation and Permission Bypasses on Android Through App Components. 233-251
Authentication
- Bertram Poettering

, Simon Rastikian:
Sequential Digital Signatures for Cryptographic Software-Update Authentication. 255-274 - John Chan, Phillip Rogaway:

On Committing Authenticated-Encryption. 275-294 - Jingwei Jiang, Ding Wang

, Guoyin Zhang, Zhiyuan Chen:
Quantum-Resistant Password-Based Threshold Single-Sign-On Authentication with Updatable Server Private Key. 295-316 - Alessia Michela Di Campi, Riccardo Focardi

, Flaminia L. Luccio
:
The Revenge of Password Crackers: Automated Training of Password Cracking Tools. 317-336 - Mingming Jiang

, Shengli Liu, Shuai Han, Dawu Gu:
Fuzzy Authenticated Key Exchange with Tight Security. 337-360 - Benjamin Dowling

, Felix Günther
, Alexandre Poirrier
:
Continuous Authentication in Secure Messaging. 361-381
Digital Signatures
- Yanbo Chen, Yunlei Zhao:

Half-Aggregation of Schnorr Signatures with Tight Reductions. 385-404 - Dario Fiore, Lydia Garms, Dimitris Kolonelos, Claudio Soriente, Ida Tucker:

Ring Signatures with User-Controlled Linkability. 405-426 - Jonathan Bootle

, Kaoutar Elkhiyaoui, Julia Hesse, Yacov Manevich:
DualDory: Logarithmic-Verifier Linkable Ring Signatures Through Preprocessing. 427-446 - Tuong Ngoc Nguyen

, The Anh Ta
, Huy Quoc Le
, Dung Hoang Duong
, Willy Susilo
, Fuchun Guo
, Kazuhide Fukushima
, Shinsaku Kiyomoto
:
Efficient Unique Ring Signatures from Lattices. 447-466 - Sri Aravinda Krishnan Thyagarajan

, Giulio Malavolta
, Fritz Schmid, Dominique Schröder:
Verifiable Timed Linkable Ring Signatures for Scalable Payments for Monero. 467-486 - Andreas Erwig, Siavash Riahi:

Deterministic Wallets for Adaptor Signatures. 487-506 - Mei Jiang

, Dung Hoang Duong
, Willy Susilo
:
Puncturable Signature: A Generic Construction and Instantiations. 507-527
IoT Security
- Xinhui Shao, Lan Luo, Zhen Ling, Huaiyu Yan, Yumeng Wei, Xinwen Fu

:
fASLR: Function-Based ASLR for Resource-Constrained IoT Systems. 531-548 - Hyunwoo Lee, Anand Mudgerikar, Ashish Kundu, Ninghui Li, Elisa Bertino:

An Infection-Identifying and Self-Evolving System for IoT Early Defense from Multi-Step Attacks. 549-568 - Ruoyu Li

, Qing Li
, Yucheng Huang, Wenbin Zhang, Peican Zhu
, Yong Jiang:
IoTEnsemble: Detection of Botnet Attacks on Internet of Things. 569-588 - Javaria Ahmad, Fengjun Li, Bo Luo

:
IoTPrivComp: A Measurement Study of Privacy Compliance in IoT Apps. 589-609 - Yuantian Miao, Chao Chen, Lei Pan, Shigang Liu, Seyit Camtepe, Jun Zhang, Yang Xiang:

No-Label User-Level Membership Inference for ASR Model Auditing. 610-628
Applications
- Véronique Cortier, Pierrick Gaudry, Quentin Yang

:
A Toolbox for Verifiable Tally-Hiding E-Voting Systems. 631-652 - Henri Devillez, Olivier Pereira, Thomas Peters:

How to Verifiably Encrypt Many Bits for an Election? 653-671 - Michael Backes, Pascal Berrang, Lucjan Hanzlik, Ivan Pryvalov:

A Framework for Constructing Single Secret Leader Election from MPC. 672-691 - Darius Suciu, Radu Sion, Michael Ferdman:

AppBastion: Protection from Untrusted Apps and OSes on ARM. 692-715 - Jesus Cumplido, Cristina Alcaraz, Javier López:

Collaborative Anomaly Detection System for Charging Stations. 716-736

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














