Search dblp for Publications

export results for "toc:db/conf/esorics/esorics2019-1.bht:"

 download as .bib file

@inproceedings{DBLP:conf/esorics/0001M19,
  author       = {Yusuke Kawamoto and
                  Takao Murakami},
  editor       = {Kazue Sako and
                  Steve A. Schneider and
                  Peter Y. A. Ryan},
  title        = {Local Obfuscation Mechanisms for Hiding Probability Distributions},
  booktitle    = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research
                  in Computer Security, Luxembourg, September 23-27, 2019, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11735},
  pages        = {128--148},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-29959-0\_7},
  doi          = {10.1007/978-3-030-29959-0\_7},
  timestamp    = {Fri, 07 Aug 2020 17:57:31 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/0001M19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/0001SLMG19,
  author       = {Michael Schwarz and
                  Martin Schwarzl and
                  Moritz Lipp and
                  Jon Masters and
                  Daniel Gruss},
  editor       = {Kazue Sako and
                  Steve A. Schneider and
                  Peter Y. A. Ryan},
  title        = {NetSpectre: Read Arbitrary Memory over Network},
  booktitle    = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research
                  in Computer Security, Luxembourg, September 23-27, 2019, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11735},
  pages        = {279--299},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-29959-0\_14},
  doi          = {10.1007/978-3-030-29959-0\_14},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/0001SLMG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/ArfeltBD19,
  author       = {Emma Arfelt and
                  David A. Basin and
                  S{\o}ren Debois},
  editor       = {Kazue Sako and
                  Steve A. Schneider and
                  Peter Y. A. Ryan},
  title        = {Monitoring the {GDPR}},
  booktitle    = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research
                  in Computer Security, Luxembourg, September 23-27, 2019, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11735},
  pages        = {681--699},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-29959-0\_33},
  doi          = {10.1007/978-3-030-29959-0\_33},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/ArfeltBD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/BartheBCFGS19,
  author       = {Gilles Barthe and
                  Sonia Bela{\"{\i}}d and
                  Ga{\"{e}}tan Cassiers and
                  Pierre{-}Alain Fouque and
                  Benjamin Gr{\'{e}}goire and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Kazue Sako and
                  Steve A. Schneider and
                  Peter Y. A. Ryan},
  title        = {maskVerif: Automated Verification of Higher-Order Masking in Presence
                  of Physical Defaults},
  booktitle    = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research
                  in Computer Security, Luxembourg, September 23-27, 2019, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11735},
  pages        = {300--318},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-29959-0\_15},
  doi          = {10.1007/978-3-030-29959-0\_15},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/BartheBCFGS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/BursucK19,
  author       = {Sergiu Bursuc and
                  Steve Kremer},
  editor       = {Kazue Sako and
                  Steve A. Schneider and
                  Peter Y. A. Ryan},
  title        = {Contingent Payments on a Public Ledger: Models and Reductions for
                  Automated Verification},
  booktitle    = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research
                  in Computer Security, Luxembourg, September 23-27, 2019, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11735},
  pages        = {361--382},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-29959-0\_18},
  doi          = {10.1007/978-3-030-29959-0\_18},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/BursucK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/BuserLSSS19,
  author       = {Maxime Buser and
                  Joseph K. Liu and
                  Ron Steinfeld and
                  Amin Sakzad and
                  Shifeng Sun},
  editor       = {Kazue Sako and
                  Steve A. Schneider and
                  Peter Y. A. Ryan},
  title        = {{DGM:} {A} Dynamic and Revocable Group Merkle Signature},
  booktitle    = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research
                  in Computer Security, Luxembourg, September 23-27, 2019, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11735},
  pages        = {194--214},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-29959-0\_10},
  doi          = {10.1007/978-3-030-29959-0\_10},
  timestamp    = {Wed, 25 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/BuserLSSS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/ChenJJBN19,
  author       = {Shan Chen and
                  Samuel Jero and
                  Matthew Jagielski and
                  Alexandra Boldyreva and
                  Cristina Nita{-}Rotaru},
  editor       = {Kazue Sako and
                  Steve A. Schneider and
                  Peter Y. A. Ryan},
  title        = {Secure Communication Channel Establishment: {TLS} 1.3 (over {TCP}
                  Fast Open) vs. {QUIC}},
  booktitle    = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research
                  in Computer Security, Luxembourg, September 23-27, 2019, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11735},
  pages        = {404--426},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-29959-0\_20},
  doi          = {10.1007/978-3-030-29959-0\_20},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/ChenJJBN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/CurranLGPD19,
  author       = {Max Curran and
                  Xiao Liang and
                  Himanshu Gupta and
                  Omkant Pandey and
                  Samir R. Das},
  editor       = {Kazue Sako and
                  Steve A. Schneider and
                  Peter Y. A. Ryan},
  title        = {ProCSA: Protecting Privacy in Crowdsourced Spectrum Allocation},
  booktitle    = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research
                  in Computer Security, Luxembourg, September 23-27, 2019, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11735},
  pages        = {556--576},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-29959-0\_27},
  doi          = {10.1007/978-3-030-29959-0\_27},
  timestamp    = {Tue, 15 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/CurranLGPD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/DangTC19,
  author       = {Hung Dang and
                  Dat Le Tien and
                  Ee{-}Chien Chang},
  editor       = {Kazue Sako and
                  Steve A. Schneider and
                  Peter Y. A. Ryan},
  title        = {Towards a Marketplace for Secure Outsourced Computations},
  booktitle    = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research
                  in Computer Security, Luxembourg, September 23-27, 2019, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11735},
  pages        = {790--808},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-29959-0\_38},
  doi          = {10.1007/978-3-030-29959-0\_38},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/DangTC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/DebantDW19,
  author       = {Alexandre Debant and
                  St{\'{e}}phanie Delaune and
                  Cyrille Wiedling},
  editor       = {Kazue Sako and
                  Steve A. Schneider and
                  Peter Y. A. Ryan},
  title        = {Symbolic Analysis of Terrorist Fraud Resistance},
  booktitle    = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research
                  in Computer Security, Luxembourg, September 23-27, 2019, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11735},
  pages        = {383--403},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-29959-0\_19},
  doi          = {10.1007/978-3-030-29959-0\_19},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/DebantDW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/FilimonovHMS19,
  author       = {Ihor Filimonov and
                  Ross Horne and
                  Sjouke Mauw and
                  Zach Smith},
  editor       = {Kazue Sako and
                  Steve A. Schneider and
                  Peter Y. A. Ryan},
  title        = {Breaking Unlinkability of the {ICAO} 9303 Standard for e-Passports
                  Using Bisimilarity},
  booktitle    = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research
                  in Computer Security, Luxembourg, September 23-27, 2019, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11735},
  pages        = {577--594},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-29959-0\_28},
  doi          = {10.1007/978-3-030-29959-0\_28},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/FilimonovHMS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/GiechaskielZR19,
  author       = {Ilias Giechaskiel and
                  Youqian Zhang and
                  Kasper Bonne Rasmussen},
  editor       = {Kazue Sako and
                  Steve A. Schneider and
                  Peter Y. A. Ryan},
  title        = {A Framework for Evaluating Security in the Presence of Signal Injection
                  Attacks},
  booktitle    = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research
                  in Computer Security, Luxembourg, September 23-27, 2019, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11735},
  pages        = {512--532},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-29959-0\_25},
  doi          = {10.1007/978-3-030-29959-0\_25},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/GiechaskielZR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/GondronM19,
  author       = {S{\'{e}}bastien Gondron and
                  Sebastian M{\"{o}}dersheim},
  editor       = {Kazue Sako and
                  Steve A. Schneider and
                  Peter Y. A. Ryan},
  title        = {Formalizing and Proving Privacy Properties of Voting Protocols Using
                  Alpha-Beta Privacy},
  booktitle    = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research
                  in Computer Security, Luxembourg, September 23-27, 2019, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11735},
  pages        = {535--555},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-29959-0\_26},
  doi          = {10.1007/978-3-030-29959-0\_26},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/GondronM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/GuarnizoS19,
  author       = {Juan Guarnizo and
                  Pawel Szalachowski},
  editor       = {Kazue Sako and
                  Steve A. Schneider and
                  Peter Y. A. Ryan},
  title        = {{PDFS:} Practical Data Feed Service for Smart Contracts},
  booktitle    = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research
                  in Computer Security, Luxembourg, September 23-27, 2019, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11735},
  pages        = {767--789},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-29959-0\_37},
  doi          = {10.1007/978-3-030-29959-0\_37},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/GuarnizoS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/GuoZ0X19,
  author       = {Hui Guo and
                  Zhenfeng Zhang and
                  Jing Xu and
                  Mingyuan Xia},
  editor       = {Kazue Sako and
                  Steve A. Schneider and
                  Peter Y. A. Ryan},
  title        = {Generic Traceable Proxy Re-encryption and Accountable Extension in
                  Consensus Network},
  booktitle    = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research
                  in Computer Security, Luxembourg, September 23-27, 2019, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11735},
  pages        = {234--256},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-29959-0\_12},
  doi          = {10.1007/978-3-030-29959-0\_12},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/GuoZ0X19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/GuzmanTS19,
  author       = {Jaybie A. de Guzman and
                  Kanchana Thilakarathna and
                  Aruna Seneviratne},
  editor       = {Kazue Sako and
                  Steve A. Schneider and
                  Peter Y. A. Ryan},
  title        = {A First Look into Privacy Leakage in 3D Mixed Reality Data},
  booktitle    = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research
                  in Computer Security, Luxembourg, September 23-27, 2019, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11735},
  pages        = {149--169},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-29959-0\_8},
  doi          = {10.1007/978-3-030-29959-0\_8},
  timestamp    = {Mon, 23 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/GuzmanTS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/HaupertG19,
  author       = {Vincent Haupert and
                  Stephan Gabert},
  editor       = {Kazue Sako and
                  Steve A. Schneider and
                  Peter Y. A. Ryan},
  title        = {Where to Look for What You See Is What You Sign? User Confusion in
                  Transaction Security},
  booktitle    = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research
                  in Computer Security, Luxembourg, September 23-27, 2019, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11735},
  pages        = {429--449},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-29959-0\_21},
  doi          = {10.1007/978-3-030-29959-0\_21},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/HaupertG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/LeKK19,
  author       = {Duc Viet Le and
                  Mahimna Kelkar and
                  Aniket Kate},
  editor       = {Kazue Sako and
                  Steve A. Schneider and
                  Peter Y. A. Ryan},
  title        = {Flexible Signatures: Making Authentication Suitable for Real-Time
                  Environments},
  booktitle    = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research
                  in Computer Security, Luxembourg, September 23-27, 2019, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11735},
  pages        = {173--193},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-29959-0\_9},
  doi          = {10.1007/978-3-030-29959-0\_9},
  timestamp    = {Mon, 29 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/LeKK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/LiuNYWW19,
  author       = {Zhen Liu and
                  Khoa Nguyen and
                  Guomin Yang and
                  Huaxiong Wang and
                  Duncan S. Wong},
  editor       = {Kazue Sako and
                  Steve A. Schneider and
                  Peter Y. A. Ryan},
  title        = {A Lattice-Based Linkable Ring Signature Supporting Stealth Addresses},
  booktitle    = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research
                  in Computer Security, Luxembourg, September 23-27, 2019, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11735},
  pages        = {726--746},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-29959-0\_35},
  doi          = {10.1007/978-3-030-29959-0\_35},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/LiuNYWW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/MaBNLODJ19,
  author       = {Siqi Ma and
                  Elisa Bertino and
                  Surya Nepal and
                  Juanru Li and
                  Diethelm Ostry and
                  Robert H. Deng and
                  Sanjay Jha},
  editor       = {Kazue Sako and
                  Steve A. Schneider and
                  Peter Y. A. Ryan},
  title        = {Finding Flaws from Password Authentication Code in Android Apps},
  booktitle    = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research
                  in Computer Security, Luxembourg, September 23-27, 2019, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11735},
  pages        = {619--637},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-29959-0\_30},
  doi          = {10.1007/978-3-030-29959-0\_30},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/MaBNLODJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/MarcSHBM19,
  author       = {Tilen Marc and
                  Miha Stopar and
                  Jan Hartman and
                  Manca Bizjak and
                  Jolanda Modic},
  editor       = {Kazue Sako and
                  Steve A. Schneider and
                  Peter Y. A. Ryan},
  title        = {Privacy-Enhanced Machine Learning with Functional Encryption},
  booktitle    = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research
                  in Computer Security, Luxembourg, September 23-27, 2019, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11735},
  pages        = {3--21},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-29959-0\_1},
  doi          = {10.1007/978-3-030-29959-0\_1},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/MarcSHBM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/MengLJCS19,
  author       = {Weizhi Meng and
                  Wenjuan Li and
                  Lijun Jiang and
                  Kim{-}Kwang Raymond Choo and
                  Chunhua Su},
  editor       = {Kazue Sako and
                  Steve A. Schneider and
                  Peter Y. A. Ryan},
  title        = {Practical Bayesian Poisoning Attacks on Challenge-Based Collaborative
                  Intrusion Detection Networks},
  booktitle    = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research
                  in Computer Security, Luxembourg, September 23-27, 2019, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11735},
  pages        = {493--511},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-29959-0\_24},
  doi          = {10.1007/978-3-030-29959-0\_24},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/MengLJCS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/MillerP19,
  author       = {Lo{\"{\i}}c Miller and
                  Cristel Pelsser},
  editor       = {Kazue Sako and
                  Steve A. Schneider and
                  Peter Y. A. Ryan},
  title        = {A Taxonomy of Attacks Using {BGP} Blackholing},
  booktitle    = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research
                  in Computer Security, Luxembourg, September 23-27, 2019, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11735},
  pages        = {107--127},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-29959-0\_6},
  doi          = {10.1007/978-3-030-29959-0\_6},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/MillerP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/MinematsuK19,
  author       = {Kazuhiko Minematsu and
                  Norifumi Kamiya},
  editor       = {Kazue Sako and
                  Steve A. Schneider and
                  Peter Y. A. Ryan},
  title        = {Symmetric-Key Corruption Detection: When XOR-MACs Meet Combinatorial
                  Group Testing},
  booktitle    = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research
                  in Computer Security, Luxembourg, September 23-27, 2019, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11735},
  pages        = {595--615},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-29959-0\_29},
  doi          = {10.1007/978-3-030-29959-0\_29},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/MinematsuK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/MitchellK19,
  author       = {Duncan Mitchell and
                  Johannes Kinder},
  editor       = {Kazue Sako and
                  Steve A. Schneider and
                  Peter Y. A. Ryan},
  title        = {A Formal Model for Checking Cryptographic {API} Usage in JavaScript},
  booktitle    = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research
                  in Computer Security, Luxembourg, September 23-27, 2019, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11735},
  pages        = {341--360},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-29959-0\_17},
  doi          = {10.1007/978-3-030-29959-0\_17},
  timestamp    = {Tue, 24 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/MitchellK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/Novakovic019,
  author       = {Chris Novakovic and
                  David Parker},
  editor       = {Kazue Sako and
                  Steve A. Schneider and
                  Peter Y. A. Ryan},
  title        = {Automated Formal Analysis of Side-Channel Attacks on Probabilistic
                  Systems},
  booktitle    = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research
                  in Computer Security, Luxembourg, September 23-27, 2019, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11735},
  pages        = {319--337},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-29959-0\_16},
  doi          = {10.1007/978-3-030-29959-0\_16},
  timestamp    = {Mon, 23 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/Novakovic019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/OqailyJZ0PD19,
  author       = {Momen Oqaily and
                  Yosr Jarraya and
                  Mengyuan Zhang and
                  Lingyu Wang and
                  Makan Pourzandi and
                  Mourad Debbabi},
  editor       = {Kazue Sako and
                  Steve A. Schneider and
                  Peter Y. A. Ryan},
  title        = {iCAT: An Interactive Customizable Anonymization Tool},
  booktitle    = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research
                  in Computer Security, Luxembourg, September 23-27, 2019, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11735},
  pages        = {658--680},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-29959-0\_32},
  doi          = {10.1007/978-3-030-29959-0\_32},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/OqailyJZ0PD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/PhuongSKYL19,
  author       = {Tran Viet Xuan Phuong and
                  Willy Susilo and
                  Jongkil Kim and
                  Guomin Yang and
                  Dongxi Liu},
  editor       = {Kazue Sako and
                  Steve A. Schneider and
                  Peter Y. A. Ryan},
  title        = {Puncturable Proxy Re-Encryption Supporting to Group Messaging Service},
  booktitle    = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research
                  in Computer Security, Luxembourg, September 23-27, 2019, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11735},
  pages        = {215--233},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-29959-0\_11},
  doi          = {10.1007/978-3-030-29959-0\_11},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/PhuongSKYL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/QuiringKR19,
  author       = {Erwin Quiring and
                  Matthias Kirchner and
                  Konrad Rieck},
  editor       = {Kazue Sako and
                  Steve A. Schneider and
                  Peter Y. A. Ryan},
  title        = {On the Security and Applicability of Fragile Camera Fingerprints},
  booktitle    = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research
                  in Computer Security, Luxembourg, September 23-27, 2019, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11735},
  pages        = {450--470},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-29959-0\_22},
  doi          = {10.1007/978-3-030-29959-0\_22},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/QuiringKR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/SharmaC19,
  author       = {Sagar Sharma and
                  Keke Chen},
  editor       = {Kazue Sako and
                  Steve A. Schneider and
                  Peter Y. A. Ryan},
  title        = {Confidential Boosting with Random Linear Classifiers for Outsourced
                  User-Generated Data},
  booktitle    = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research
                  in Computer Security, Luxembourg, September 23-27, 2019, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11735},
  pages        = {41--65},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-29959-0\_3},
  doi          = {10.1007/978-3-030-29959-0\_3},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/SharmaC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/SperlB19,
  author       = {Philip Sperl and
                  Konstantin B{\"{o}}ttinger},
  editor       = {Kazue Sako and
                  Steve A. Schneider and
                  Peter Y. A. Ryan},
  title        = {Side-Channel Aware Fuzzing},
  booktitle    = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research
                  in Computer Security, Luxembourg, September 23-27, 2019, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11735},
  pages        = {259--278},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-29959-0\_13},
  doi          = {10.1007/978-3-030-29959-0\_13},
  timestamp    = {Mon, 23 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/SperlB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/TurnerLM19,
  author       = {Henry Turner and
                  Giulio Lovisotto and
                  Ivan Martinovic},
  editor       = {Kazue Sako and
                  Steve A. Schneider and
                  Peter Y. A. Ryan},
  title        = {Attacking Speaker Recognition Systems with Phoneme Morphing},
  booktitle    = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research
                  in Computer Security, Luxembourg, September 23-27, 2019, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11735},
  pages        = {471--492},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-29959-0\_23},
  doi          = {10.1007/978-3-030-29959-0\_23},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/TurnerLM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/WardSSMO19,
  author       = {Bryan C. Ward and
                  Richard Skowyra and
                  Chad Spensky and
                  Jason Martin and
                  Hamed Okhravi},
  editor       = {Kazue Sako and
                  Steve A. Schneider and
                  Peter Y. A. Ryan},
  title        = {The Leakage-Resilience Dilemma},
  booktitle    = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research
                  in Computer Security, Luxembourg, September 23-27, 2019, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11735},
  pages        = {87--106},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-29959-0\_5},
  doi          = {10.1007/978-3-030-29959-0\_5},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/WardSSMO19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/WeissS19,
  author       = {Konrad Weiss and
                  Julian Sch{\"{u}}tte},
  editor       = {Kazue Sako and
                  Steve A. Schneider and
                  Peter Y. A. Ryan},
  title        = {Annotary: {A} Concolic Execution System for Developing Secure Smart
                  Contracts},
  booktitle    = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research
                  in Computer Security, Luxembourg, September 23-27, 2019, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11735},
  pages        = {747--766},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-29959-0\_36},
  doi          = {10.1007/978-3-030-29959-0\_36},
  timestamp    = {Mon, 23 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/WeissS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/YaoZJZLZ19,
  author       = {Yao Yao and
                  Wei Zhou and
                  Yan Jia and
                  Lipeng Zhu and
                  Peng Liu and
                  Yuqing Zhang},
  editor       = {Kazue Sako and
                  Steve A. Schneider and
                  Peter Y. A. Ryan},
  title        = {Identifying Privilege Separation Vulnerabilities in IoT Firmware with
                  Symbolic Execution},
  booktitle    = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research
                  in Computer Security, Luxembourg, September 23-27, 2019, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11735},
  pages        = {638--657},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-29959-0\_31},
  doi          = {10.1007/978-3-030-29959-0\_31},
  timestamp    = {Thu, 18 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/YaoZJZLZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/ZhengDW19,
  author       = {Yifeng Zheng and
                  Huayi Duan and
                  Cong Wang},
  editor       = {Kazue Sako and
                  Steve A. Schneider and
                  Peter Y. A. Ryan},
  title        = {Towards Secure and Efficient Outsourcing of Machine Learning Classification},
  booktitle    = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research
                  in Computer Security, Luxembourg, September 23-27, 2019, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11735},
  pages        = {22--40},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-29959-0\_2},
  doi          = {10.1007/978-3-030-29959-0\_2},
  timestamp    = {Fri, 24 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/ZhengDW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/ZhengYHFS19,
  author       = {Huadi Zheng and
                  Qingqing Ye and
                  Haibo Hu and
                  Chengfang Fang and
                  Jie Shi},
  editor       = {Kazue Sako and
                  Steve A. Schneider and
                  Peter Y. A. Ryan},
  title        = {{BDPL:} {A} Boundary Differentially Private Layer Against Machine
                  Learning Model Extraction Attacks},
  booktitle    = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research
                  in Computer Security, Luxembourg, September 23-27, 2019, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11735},
  pages        = {66--83},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-29959-0\_4},
  doi          = {10.1007/978-3-030-29959-0\_4},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/ZhengYHFS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/ZolotavkinK19,
  author       = {Yevhen Zolotavkin and
                  Veronika Kuchta},
  editor       = {Kazue Sako and
                  Steve A. Schneider and
                  Peter Y. A. Ryan},
  title        = {Incentives for Harvesting Attack in Proof of Work Mining Pools},
  booktitle    = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research
                  in Computer Security, Luxembourg, September 23-27, 2019, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11735},
  pages        = {703--725},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-29959-0\_34},
  doi          = {10.1007/978-3-030-29959-0\_34},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/ZolotavkinK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2019-1,
  editor       = {Kazue Sako and
                  Steve A. Schneider and
                  Peter Y. A. Ryan},
  title        = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research
                  in Computer Security, Luxembourg, September 23-27, 2019, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11735},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-29959-0},
  doi          = {10.1007/978-3-030-29959-0},
  isbn         = {978-3-030-29958-3},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/2019-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics