Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/esorics/esorics2019-1.bht:"
@inproceedings{DBLP:conf/esorics/0001M19, author = {Yusuke Kawamoto and Takao Murakami}, editor = {Kazue Sako and Steve A. Schneider and Peter Y. A. Ryan}, title = {Local Obfuscation Mechanisms for Hiding Probability Distributions}, booktitle = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11735}, pages = {128--148}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-29959-0\_7}, doi = {10.1007/978-3-030-29959-0\_7}, timestamp = {Fri, 07 Aug 2020 17:57:31 +0200}, biburl = {https://dblp.org/rec/conf/esorics/0001M19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/0001SLMG19, author = {Michael Schwarz and Martin Schwarzl and Moritz Lipp and Jon Masters and Daniel Gruss}, editor = {Kazue Sako and Steve A. Schneider and Peter Y. A. Ryan}, title = {NetSpectre: Read Arbitrary Memory over Network}, booktitle = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11735}, pages = {279--299}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-29959-0\_14}, doi = {10.1007/978-3-030-29959-0\_14}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/0001SLMG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/ArfeltBD19, author = {Emma Arfelt and David A. Basin and S{\o}ren Debois}, editor = {Kazue Sako and Steve A. Schneider and Peter Y. A. Ryan}, title = {Monitoring the {GDPR}}, booktitle = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11735}, pages = {681--699}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-29959-0\_33}, doi = {10.1007/978-3-030-29959-0\_33}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/ArfeltBD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/BartheBCFGS19, author = {Gilles Barthe and Sonia Bela{\"{\i}}d and Ga{\"{e}}tan Cassiers and Pierre{-}Alain Fouque and Benjamin Gr{\'{e}}goire and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Kazue Sako and Steve A. Schneider and Peter Y. A. Ryan}, title = {maskVerif: Automated Verification of Higher-Order Masking in Presence of Physical Defaults}, booktitle = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11735}, pages = {300--318}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-29959-0\_15}, doi = {10.1007/978-3-030-29959-0\_15}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/BartheBCFGS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/BursucK19, author = {Sergiu Bursuc and Steve Kremer}, editor = {Kazue Sako and Steve A. Schneider and Peter Y. A. Ryan}, title = {Contingent Payments on a Public Ledger: Models and Reductions for Automated Verification}, booktitle = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11735}, pages = {361--382}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-29959-0\_18}, doi = {10.1007/978-3-030-29959-0\_18}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/BursucK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/BuserLSSS19, author = {Maxime Buser and Joseph K. Liu and Ron Steinfeld and Amin Sakzad and Shifeng Sun}, editor = {Kazue Sako and Steve A. Schneider and Peter Y. A. Ryan}, title = {{DGM:} {A} Dynamic and Revocable Group Merkle Signature}, booktitle = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11735}, pages = {194--214}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-29959-0\_10}, doi = {10.1007/978-3-030-29959-0\_10}, timestamp = {Wed, 25 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/BuserLSSS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/ChenJJBN19, author = {Shan Chen and Samuel Jero and Matthew Jagielski and Alexandra Boldyreva and Cristina Nita{-}Rotaru}, editor = {Kazue Sako and Steve A. Schneider and Peter Y. A. Ryan}, title = {Secure Communication Channel Establishment: {TLS} 1.3 (over {TCP} Fast Open) vs. {QUIC}}, booktitle = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11735}, pages = {404--426}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-29959-0\_20}, doi = {10.1007/978-3-030-29959-0\_20}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/ChenJJBN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/CurranLGPD19, author = {Max Curran and Xiao Liang and Himanshu Gupta and Omkant Pandey and Samir R. Das}, editor = {Kazue Sako and Steve A. Schneider and Peter Y. A. Ryan}, title = {ProCSA: Protecting Privacy in Crowdsourced Spectrum Allocation}, booktitle = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11735}, pages = {556--576}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-29959-0\_27}, doi = {10.1007/978-3-030-29959-0\_27}, timestamp = {Tue, 15 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/CurranLGPD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/DangTC19, author = {Hung Dang and Dat Le Tien and Ee{-}Chien Chang}, editor = {Kazue Sako and Steve A. Schneider and Peter Y. A. Ryan}, title = {Towards a Marketplace for Secure Outsourced Computations}, booktitle = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11735}, pages = {790--808}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-29959-0\_38}, doi = {10.1007/978-3-030-29959-0\_38}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/DangTC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/DebantDW19, author = {Alexandre Debant and St{\'{e}}phanie Delaune and Cyrille Wiedling}, editor = {Kazue Sako and Steve A. Schneider and Peter Y. A. Ryan}, title = {Symbolic Analysis of Terrorist Fraud Resistance}, booktitle = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11735}, pages = {383--403}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-29959-0\_19}, doi = {10.1007/978-3-030-29959-0\_19}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/DebantDW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/FilimonovHMS19, author = {Ihor Filimonov and Ross Horne and Sjouke Mauw and Zach Smith}, editor = {Kazue Sako and Steve A. Schneider and Peter Y. A. Ryan}, title = {Breaking Unlinkability of the {ICAO} 9303 Standard for e-Passports Using Bisimilarity}, booktitle = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11735}, pages = {577--594}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-29959-0\_28}, doi = {10.1007/978-3-030-29959-0\_28}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/FilimonovHMS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/GiechaskielZR19, author = {Ilias Giechaskiel and Youqian Zhang and Kasper Bonne Rasmussen}, editor = {Kazue Sako and Steve A. Schneider and Peter Y. A. Ryan}, title = {A Framework for Evaluating Security in the Presence of Signal Injection Attacks}, booktitle = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11735}, pages = {512--532}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-29959-0\_25}, doi = {10.1007/978-3-030-29959-0\_25}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/GiechaskielZR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/GondronM19, author = {S{\'{e}}bastien Gondron and Sebastian M{\"{o}}dersheim}, editor = {Kazue Sako and Steve A. Schneider and Peter Y. A. Ryan}, title = {Formalizing and Proving Privacy Properties of Voting Protocols Using Alpha-Beta Privacy}, booktitle = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11735}, pages = {535--555}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-29959-0\_26}, doi = {10.1007/978-3-030-29959-0\_26}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/GondronM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/GuarnizoS19, author = {Juan Guarnizo and Pawel Szalachowski}, editor = {Kazue Sako and Steve A. Schneider and Peter Y. A. Ryan}, title = {{PDFS:} Practical Data Feed Service for Smart Contracts}, booktitle = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11735}, pages = {767--789}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-29959-0\_37}, doi = {10.1007/978-3-030-29959-0\_37}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/GuarnizoS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/GuoZ0X19, author = {Hui Guo and Zhenfeng Zhang and Jing Xu and Mingyuan Xia}, editor = {Kazue Sako and Steve A. Schneider and Peter Y. A. Ryan}, title = {Generic Traceable Proxy Re-encryption and Accountable Extension in Consensus Network}, booktitle = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11735}, pages = {234--256}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-29959-0\_12}, doi = {10.1007/978-3-030-29959-0\_12}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/GuoZ0X19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/GuzmanTS19, author = {Jaybie A. de Guzman and Kanchana Thilakarathna and Aruna Seneviratne}, editor = {Kazue Sako and Steve A. Schneider and Peter Y. A. Ryan}, title = {A First Look into Privacy Leakage in 3D Mixed Reality Data}, booktitle = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11735}, pages = {149--169}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-29959-0\_8}, doi = {10.1007/978-3-030-29959-0\_8}, timestamp = {Mon, 23 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/GuzmanTS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/HaupertG19, author = {Vincent Haupert and Stephan Gabert}, editor = {Kazue Sako and Steve A. Schneider and Peter Y. A. Ryan}, title = {Where to Look for What You See Is What You Sign? User Confusion in Transaction Security}, booktitle = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11735}, pages = {429--449}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-29959-0\_21}, doi = {10.1007/978-3-030-29959-0\_21}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/HaupertG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/LeKK19, author = {Duc Viet Le and Mahimna Kelkar and Aniket Kate}, editor = {Kazue Sako and Steve A. Schneider and Peter Y. A. Ryan}, title = {Flexible Signatures: Making Authentication Suitable for Real-Time Environments}, booktitle = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11735}, pages = {173--193}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-29959-0\_9}, doi = {10.1007/978-3-030-29959-0\_9}, timestamp = {Mon, 29 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/LeKK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/LiuNYWW19, author = {Zhen Liu and Khoa Nguyen and Guomin Yang and Huaxiong Wang and Duncan S. Wong}, editor = {Kazue Sako and Steve A. Schneider and Peter Y. A. Ryan}, title = {A Lattice-Based Linkable Ring Signature Supporting Stealth Addresses}, booktitle = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11735}, pages = {726--746}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-29959-0\_35}, doi = {10.1007/978-3-030-29959-0\_35}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/LiuNYWW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/MaBNLODJ19, author = {Siqi Ma and Elisa Bertino and Surya Nepal and Juanru Li and Diethelm Ostry and Robert H. Deng and Sanjay Jha}, editor = {Kazue Sako and Steve A. Schneider and Peter Y. A. Ryan}, title = {Finding Flaws from Password Authentication Code in Android Apps}, booktitle = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11735}, pages = {619--637}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-29959-0\_30}, doi = {10.1007/978-3-030-29959-0\_30}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/MaBNLODJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/MarcSHBM19, author = {Tilen Marc and Miha Stopar and Jan Hartman and Manca Bizjak and Jolanda Modic}, editor = {Kazue Sako and Steve A. Schneider and Peter Y. A. Ryan}, title = {Privacy-Enhanced Machine Learning with Functional Encryption}, booktitle = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11735}, pages = {3--21}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-29959-0\_1}, doi = {10.1007/978-3-030-29959-0\_1}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/MarcSHBM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/MengLJCS19, author = {Weizhi Meng and Wenjuan Li and Lijun Jiang and Kim{-}Kwang Raymond Choo and Chunhua Su}, editor = {Kazue Sako and Steve A. Schneider and Peter Y. A. Ryan}, title = {Practical Bayesian Poisoning Attacks on Challenge-Based Collaborative Intrusion Detection Networks}, booktitle = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11735}, pages = {493--511}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-29959-0\_24}, doi = {10.1007/978-3-030-29959-0\_24}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/MengLJCS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/MillerP19, author = {Lo{\"{\i}}c Miller and Cristel Pelsser}, editor = {Kazue Sako and Steve A. Schneider and Peter Y. A. Ryan}, title = {A Taxonomy of Attacks Using {BGP} Blackholing}, booktitle = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11735}, pages = {107--127}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-29959-0\_6}, doi = {10.1007/978-3-030-29959-0\_6}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/MillerP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/MinematsuK19, author = {Kazuhiko Minematsu and Norifumi Kamiya}, editor = {Kazue Sako and Steve A. Schneider and Peter Y. A. Ryan}, title = {Symmetric-Key Corruption Detection: When XOR-MACs Meet Combinatorial Group Testing}, booktitle = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11735}, pages = {595--615}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-29959-0\_29}, doi = {10.1007/978-3-030-29959-0\_29}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/MinematsuK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/MitchellK19, author = {Duncan Mitchell and Johannes Kinder}, editor = {Kazue Sako and Steve A. Schneider and Peter Y. A. Ryan}, title = {A Formal Model for Checking Cryptographic {API} Usage in JavaScript}, booktitle = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11735}, pages = {341--360}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-29959-0\_17}, doi = {10.1007/978-3-030-29959-0\_17}, timestamp = {Tue, 24 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/MitchellK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/Novakovic019, author = {Chris Novakovic and David Parker}, editor = {Kazue Sako and Steve A. Schneider and Peter Y. A. Ryan}, title = {Automated Formal Analysis of Side-Channel Attacks on Probabilistic Systems}, booktitle = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11735}, pages = {319--337}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-29959-0\_16}, doi = {10.1007/978-3-030-29959-0\_16}, timestamp = {Mon, 23 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/Novakovic019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/OqailyJZ0PD19, author = {Momen Oqaily and Yosr Jarraya and Mengyuan Zhang and Lingyu Wang and Makan Pourzandi and Mourad Debbabi}, editor = {Kazue Sako and Steve A. Schneider and Peter Y. A. Ryan}, title = {iCAT: An Interactive Customizable Anonymization Tool}, booktitle = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11735}, pages = {658--680}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-29959-0\_32}, doi = {10.1007/978-3-030-29959-0\_32}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/OqailyJZ0PD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/PhuongSKYL19, author = {Tran Viet Xuan Phuong and Willy Susilo and Jongkil Kim and Guomin Yang and Dongxi Liu}, editor = {Kazue Sako and Steve A. Schneider and Peter Y. A. Ryan}, title = {Puncturable Proxy Re-Encryption Supporting to Group Messaging Service}, booktitle = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11735}, pages = {215--233}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-29959-0\_11}, doi = {10.1007/978-3-030-29959-0\_11}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/PhuongSKYL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/QuiringKR19, author = {Erwin Quiring and Matthias Kirchner and Konrad Rieck}, editor = {Kazue Sako and Steve A. Schneider and Peter Y. A. Ryan}, title = {On the Security and Applicability of Fragile Camera Fingerprints}, booktitle = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11735}, pages = {450--470}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-29959-0\_22}, doi = {10.1007/978-3-030-29959-0\_22}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/QuiringKR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/SharmaC19, author = {Sagar Sharma and Keke Chen}, editor = {Kazue Sako and Steve A. Schneider and Peter Y. A. Ryan}, title = {Confidential Boosting with Random Linear Classifiers for Outsourced User-Generated Data}, booktitle = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11735}, pages = {41--65}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-29959-0\_3}, doi = {10.1007/978-3-030-29959-0\_3}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/SharmaC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/SperlB19, author = {Philip Sperl and Konstantin B{\"{o}}ttinger}, editor = {Kazue Sako and Steve A. Schneider and Peter Y. A. Ryan}, title = {Side-Channel Aware Fuzzing}, booktitle = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11735}, pages = {259--278}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-29959-0\_13}, doi = {10.1007/978-3-030-29959-0\_13}, timestamp = {Mon, 23 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/SperlB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/TurnerLM19, author = {Henry Turner and Giulio Lovisotto and Ivan Martinovic}, editor = {Kazue Sako and Steve A. Schneider and Peter Y. A. Ryan}, title = {Attacking Speaker Recognition Systems with Phoneme Morphing}, booktitle = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11735}, pages = {471--492}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-29959-0\_23}, doi = {10.1007/978-3-030-29959-0\_23}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/TurnerLM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/WardSSMO19, author = {Bryan C. Ward and Richard Skowyra and Chad Spensky and Jason Martin and Hamed Okhravi}, editor = {Kazue Sako and Steve A. Schneider and Peter Y. A. Ryan}, title = {The Leakage-Resilience Dilemma}, booktitle = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11735}, pages = {87--106}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-29959-0\_5}, doi = {10.1007/978-3-030-29959-0\_5}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/WardSSMO19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/WeissS19, author = {Konrad Weiss and Julian Sch{\"{u}}tte}, editor = {Kazue Sako and Steve A. Schneider and Peter Y. A. Ryan}, title = {Annotary: {A} Concolic Execution System for Developing Secure Smart Contracts}, booktitle = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11735}, pages = {747--766}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-29959-0\_36}, doi = {10.1007/978-3-030-29959-0\_36}, timestamp = {Mon, 23 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/WeissS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/YaoZJZLZ19, author = {Yao Yao and Wei Zhou and Yan Jia and Lipeng Zhu and Peng Liu and Yuqing Zhang}, editor = {Kazue Sako and Steve A. Schneider and Peter Y. A. Ryan}, title = {Identifying Privilege Separation Vulnerabilities in IoT Firmware with Symbolic Execution}, booktitle = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11735}, pages = {638--657}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-29959-0\_31}, doi = {10.1007/978-3-030-29959-0\_31}, timestamp = {Thu, 18 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/YaoZJZLZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/ZhengDW19, author = {Yifeng Zheng and Huayi Duan and Cong Wang}, editor = {Kazue Sako and Steve A. Schneider and Peter Y. A. Ryan}, title = {Towards Secure and Efficient Outsourcing of Machine Learning Classification}, booktitle = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11735}, pages = {22--40}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-29959-0\_2}, doi = {10.1007/978-3-030-29959-0\_2}, timestamp = {Fri, 24 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/ZhengDW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/ZhengYHFS19, author = {Huadi Zheng and Qingqing Ye and Haibo Hu and Chengfang Fang and Jie Shi}, editor = {Kazue Sako and Steve A. Schneider and Peter Y. A. Ryan}, title = {{BDPL:} {A} Boundary Differentially Private Layer Against Machine Learning Model Extraction Attacks}, booktitle = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11735}, pages = {66--83}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-29959-0\_4}, doi = {10.1007/978-3-030-29959-0\_4}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/ZhengYHFS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/ZolotavkinK19, author = {Yevhen Zolotavkin and Veronika Kuchta}, editor = {Kazue Sako and Steve A. Schneider and Peter Y. A. Ryan}, title = {Incentives for Harvesting Attack in Proof of Work Mining Pools}, booktitle = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11735}, pages = {703--725}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-29959-0\_34}, doi = {10.1007/978-3-030-29959-0\_34}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/ZolotavkinK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esorics/2019-1, editor = {Kazue Sako and Steve A. Schneider and Peter Y. A. Ryan}, title = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11735}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-29959-0}, doi = {10.1007/978-3-030-29959-0}, isbn = {978-3-030-29958-3}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/2019-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.