default search action
Search dblp for Publications
export results for "toc:db/conf/esorics/esorics2018-2.bht:"
@inproceedings{DBLP:conf/esorics/Alimohammadifar18, author = {Amir Alimohammadifar and Suryadipta Majumdar and Taous Madi and Yosr Jarraya and Makan Pourzandi and Lingyu Wang and Mourad Debbabi}, editor = {Javier L{\'{o}}pez and Jianying Zhou and Miguel Soriano}, title = {Stealthy Probing-Based Verification {(SPV):} An Active Approach to Defending Software Defined Networks Against Topology Poisoning Attacks}, booktitle = {Computer Security - 23rd European Symposium on Research in Computer Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11099}, pages = {463--484}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-98989-1\_23}, doi = {10.1007/978-3-319-98989-1\_23}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/Alimohammadifar18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/BanaCE18, author = {Gergei Bana and Rohit Chadha and Ajay Kumar Eeralla}, editor = {Javier L{\'{o}}pez and Jianying Zhou and Miguel Soriano}, title = {Formal Analysis of Vote Privacy Using Computationally Complete Symbolic Attacker}, booktitle = {Computer Security - 23rd European Symposium on Research in Computer Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11099}, pages = {350--372}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-98989-1\_18}, doi = {10.1007/978-3-319-98989-1\_18}, timestamp = {Tue, 07 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/BanaCE18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/BlantonJ18, author = {Marina Blanton and Myoungin Jeong}, editor = {Javier L{\'{o}}pez and Jianying Zhou and Miguel Soriano}, title = {Improved Signature Schemes for Secure Multi-party Computation with Certified Inputs}, booktitle = {Computer Security - 23rd European Symposium on Research in Computer Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11099}, pages = {438--460}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-98989-1\_22}, doi = {10.1007/978-3-319-98989-1\_22}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/BlantonJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/BuscherW018, author = {Niklas B{\"{u}}scher and Alina Weber and Stefan Katzenbeisser}, editor = {Javier L{\'{o}}pez and Jianying Zhou and Miguel Soriano}, title = {Towards Practical {RAM} Based Secure Computation}, booktitle = {Computer Security - 23rd European Symposium on Research in Computer Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11099}, pages = {416--437}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-98989-1\_21}, doi = {10.1007/978-3-319-98989-1\_21}, timestamp = {Tue, 07 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/BuscherW018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/CanardPST18, author = {S{\'{e}}bastien Canard and David Pointcheval and Quentin Santos and Jacques Traor{\'{e}}}, editor = {Javier L{\'{o}}pez and Jianying Zhou and Miguel Soriano}, title = {Practical Strategy-Resistant Privacy-Preserving Elections}, booktitle = {Computer Security - 23rd European Symposium on Research in Computer Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11099}, pages = {331--349}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-98989-1\_17}, doi = {10.1007/978-3-319-98989-1\_17}, timestamp = {Tue, 07 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/CanardPST18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/FangY18, author = {Kaiming Fang and Guanhua Yan}, editor = {Javier L{\'{o}}pez and Jianying Zhou and Miguel Soriano}, title = {Emulation-Instrumented Fuzz Testing of 4G/LTE Android Mobile Devices Guided by Reinforcement Learning}, booktitle = {Computer Security - 23rd European Symposium on Research in Computer Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11099}, pages = {20--40}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-98989-1\_2}, doi = {10.1007/978-3-319-98989-1\_2}, timestamp = {Tue, 07 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/FangY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/GotfrydLZ18, author = {Karol Gotfryd and Pawel Lorek and Filip Zag{\'{o}}rski}, editor = {Javier L{\'{o}}pez and Jianying Zhou and Miguel Soriano}, title = {RiffleScrambler - {A} Memory-Hard Password Storing Function}, booktitle = {Computer Security - 23rd European Symposium on Research in Computer Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11099}, pages = {309--328}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-98989-1\_16}, doi = {10.1007/978-3-319-98989-1\_16}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/GotfrydLZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/GrossT018, author = {Sascha Gro{\ss} and Abhishek Tiwari and Christian Hammer}, editor = {Javier L{\'{o}}pez and Jianying Zhou and Miguel Soriano}, title = {PIAnalyzer: {A} Precise Approach for PendingIntent Vulnerability Analysis}, booktitle = {Computer Security - 23rd European Symposium on Research in Computer Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11099}, pages = {41--59}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-98989-1\_3}, doi = {10.1007/978-3-319-98989-1\_3}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/GrossT018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/IsobeM18, author = {Takanori Isobe and Kazuhiko Minematsu}, editor = {Javier L{\'{o}}pez and Jianying Zhou and Miguel Soriano}, title = {Breaking Message Integrity of an End-to-End Encryption Scheme of {LINE}}, booktitle = {Computer Security - 23rd European Symposium on Research in Computer Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11099}, pages = {249--268}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-98989-1\_13}, doi = {10.1007/978-3-319-98989-1\_13}, timestamp = {Fri, 03 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/IsobeM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/KasinathanC18, author = {Prabhakaran Kasinathan and Jorge Cu{\'{e}}llar}, editor = {Javier L{\'{o}}pez and Jianying Zhou and Miguel Soriano}, title = {Workflow-Aware Security of Integrated Mobility Services}, booktitle = {Computer Security - 23rd European Symposium on Research in Computer Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11099}, pages = {3--19}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-98989-1\_1}, doi = {10.1007/978-3-319-98989-1\_1}, timestamp = {Tue, 07 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/KasinathanC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/KimLLO18, author = {Jihye Kim and Seunghwa Lee and Jiwon Lee and Hyunok Oh}, editor = {Javier L{\'{o}}pez and Jianying Zhou and Miguel Soriano}, title = {Scalable Wildcarded Identity-Based Encryption}, booktitle = {Computer Security - 23rd European Symposium on Research in Computer Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11099}, pages = {269--287}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-98989-1\_14}, doi = {10.1007/978-3-319-98989-1\_14}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/KimLLO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/LaiT18, author = {Junzuo Lai and Qiang Tang}, editor = {Javier L{\'{o}}pez and Jianying Zhou and Miguel Soriano}, title = {Making Any Attribute-Based Encryption Accountable, Efficiently}, booktitle = {Computer Security - 23rd European Symposium on Research in Computer Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11099}, pages = {527--547}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-98989-1\_26}, doi = {10.1007/978-3-319-98989-1\_26}, timestamp = {Thu, 09 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/LaiT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/LiYWLHLL18, author = {Jin Li and Heng Ye and Wei Wang and Wenjing Lou and Y. Thomas Hou and Jiqiang Liu and Rongxing Lu}, editor = {Javier L{\'{o}}pez and Jianying Zhou and Miguel Soriano}, title = {Efficient and Secure Outsourcing of Differentially Private Data Publication}, booktitle = {Computer Security - 23rd European Symposium on Research in Computer Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11099}, pages = {187--206}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-98989-1\_10}, doi = {10.1007/978-3-319-98989-1\_10}, timestamp = {Thu, 11 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/LiYWLHLL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/LibertP018, author = {Beno{\^{\i}}t Libert and Thomas Peters and Chen Qian}, editor = {Javier L{\'{o}}pez and Jianying Zhou and Miguel Soriano}, title = {Logarithmic-Size Ring Signatures with Tight Security from the {DDH} Assumption}, booktitle = {Computer Security - 23rd European Symposium on Research in Computer Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11099}, pages = {288--308}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-98989-1\_15}, doi = {10.1007/978-3-319-98989-1\_15}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/LibertP018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/LiuMZ0H18, author = {Jianghua Liu and Jinhua Ma and Wanlei Zhou and Yang Xiang and Xinyi Huang}, editor = {Javier L{\'{o}}pez and Jianying Zhou and Miguel Soriano}, title = {Dissemination of Authenticated Tree-Structured Data with Privacy Protection and Fine-Grained Control in Outsourced Databases}, booktitle = {Computer Security - 23rd European Symposium on Research in Computer Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11099}, pages = {167--186}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-98989-1\_9}, doi = {10.1007/978-3-319-98989-1\_9}, timestamp = {Thu, 21 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/LiuMZ0H18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/Ma0YSSX18, author = {Hui Ma and Rui Zhang and Guomin Yang and Zishuai Song and Shuzhou Sun and Yuting Xiao}, editor = {Javier L{\'{o}}pez and Jianying Zhou and Miguel Soriano}, title = {Concessive Online/Offline Attribute Based Encryption with Cryptographic Reverse Firewalls - Secure and Efficient Fine-Grained Access Control on Corrupted Machines}, booktitle = {Computer Security - 23rd European Symposium on Research in Computer Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11099}, pages = {507--526}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-98989-1\_25}, doi = {10.1007/978-3-319-98989-1\_25}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/Ma0YSSX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/MichalevskyJ18, author = {Yan Michalevsky and Marc Joye}, editor = {Javier L{\'{o}}pez and Jianying Zhou and Miguel Soriano}, title = {Decentralized Policy-Hiding {ABE} with Receiver Privacy}, booktitle = {Computer Security - 23rd European Symposium on Research in Computer Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11099}, pages = {548--567}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-98989-1\_27}, doi = {10.1007/978-3-319-98989-1\_27}, timestamp = {Tue, 07 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/MichalevskyJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/MoritaATONH18, author = {Hiraku Morita and Nuttapong Attrapadung and Tadanori Teruya and Satsuya Ohata and Koji Nuida and Goichiro Hanaoka}, editor = {Javier L{\'{o}}pez and Jianying Zhou and Miguel Soriano}, title = {Constant-Round Client-Aided Secure Comparison Protocol}, booktitle = {Computer Security - 23rd European Symposium on Research in Computer Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11099}, pages = {395--415}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-98989-1\_20}, doi = {10.1007/978-3-319-98989-1\_20}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/MoritaATONH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/PaladiKE18, author = {Nicolae Paladi and Linus Karlsson and Khalid Elbashir}, editor = {Javier L{\'{o}}pez and Jianying Zhou and Miguel Soriano}, title = {Trust Anchors in Software Defined Networks}, booktitle = {Computer Security - 23rd European Symposium on Research in Computer Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11099}, pages = {485--504}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-98989-1\_24}, doi = {10.1007/978-3-319-98989-1\_24}, timestamp = {Tue, 07 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/PaladiKE18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/PatelPY18, author = {Sarvar Patel and Giuseppe Persiano and Kevin Yeo}, editor = {Javier L{\'{o}}pez and Jianying Zhou and Miguel Soriano}, title = {Symmetric Searchable Encryption with Sharing and Unsharing}, booktitle = {Computer Security - 23rd European Symposium on Research in Computer Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11099}, pages = {207--227}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-98989-1\_11}, doi = {10.1007/978-3-319-98989-1\_11}, timestamp = {Tue, 07 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/PatelPY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/TorresJ18, author = {Christof Ferreira Torres and Hugo Jonker}, editor = {Javier L{\'{o}}pez and Jianying Zhou and Miguel Soriano}, title = {Investigating Fingerprinters and Fingerprinting-Alike Behaviour of Android Applications}, booktitle = {Computer Security - 23rd European Symposium on Research in Computer Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11099}, pages = {60--80}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-98989-1\_4}, doi = {10.1007/978-3-319-98989-1\_4}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/TorresJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/Wang0SLAZ18, author = {Jianfeng Wang and Xiaofeng Chen and Shifeng Sun and Joseph K. Liu and Man Ho Au and Zhi{-}Hui Zhan}, editor = {Javier L{\'{o}}pez and Jianying Zhou and Miguel Soriano}, title = {Towards Efficient Verifiable Conjunctive Keyword Search for Large Encrypted Database}, booktitle = {Computer Security - 23rd European Symposium on Research in Computer Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11099}, pages = {83--100}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-98989-1\_5}, doi = {10.1007/978-3-319-98989-1\_5}, timestamp = {Wed, 25 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/Wang0SLAZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/WangFXHH18, author = {Wenhao Wang and Benjamin Ferrell and Xiaoyang Xu and Kevin W. Hamlen and Shuang Hao}, editor = {Javier L{\'{o}}pez and Jianying Zhou and Miguel Soriano}, title = {{SEISMIC:} SEcure In-lined Script Monitors for Interrupting Cryptojacks}, booktitle = {Computer Security - 23rd European Symposium on Research in Computer Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11099}, pages = {122--142}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-98989-1\_7}, doi = {10.1007/978-3-319-98989-1\_7}, timestamp = {Wed, 17 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/WangFXHH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/WangHRHTO18, author = {Xueou Wang and Xiaolu Hou and Ruben Rios and Per A. Hallgren and Nils Ole Tippenhauer and Mart{\'{\i}}n Ochoa}, editor = {Javier L{\'{o}}pez and Jianying Zhou and Miguel Soriano}, title = {Location Proximity Attacks Against Mobile Targets: Analytical Bounds and Attacker Strategies}, booktitle = {Computer Security - 23rd European Symposium on Research in Computer Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11099}, pages = {373--392}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-98989-1\_19}, doi = {10.1007/978-3-319-98989-1\_19}, timestamp = {Sat, 11 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/WangHRHTO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/WangZ18, author = {Xingchen Wang and Yunlei Zhao}, editor = {Javier L{\'{o}}pez and Jianying Zhou and Miguel Soriano}, title = {Order-Revealing Encryption: File-Injection Attack and Forward Security}, booktitle = {Computer Security - 23rd European Symposium on Research in Computer Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11099}, pages = {101--121}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-98989-1\_6}, doi = {10.1007/978-3-319-98989-1\_6}, timestamp = {Sat, 11 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/WangZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/XuLCCYLWS18, author = {Haitao Xu and Zhao Li and Chen Chu and Yuanmi Chen and Yifan Yang and Haifeng Lu and Haining Wang and Angelos Stavrou}, editor = {Javier L{\'{o}}pez and Jianying Zhou and Miguel Soriano}, title = {Detecting and Characterizing Web Bot Traffic in a Large E-commerce Marketplace}, booktitle = {Computer Security - 23rd European Symposium on Research in Computer Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11099}, pages = {143--163}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-98989-1\_8}, doi = {10.1007/978-3-319-98989-1\_8}, timestamp = {Tue, 18 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/XuLCCYLWS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/ZuoSLSP18, author = {Cong Zuo and Shifeng Sun and Joseph K. Liu and Jun Shao and Josef Pieprzyk}, editor = {Javier L{\'{o}}pez and Jianying Zhou and Miguel Soriano}, title = {Dynamic Searchable Symmetric Encryption Schemes Supporting Range Queries with Forward (and Backward) Security}, booktitle = {Computer Security - 23rd European Symposium on Research in Computer Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11099}, pages = {228--246}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-98989-1\_12}, doi = {10.1007/978-3-319-98989-1\_12}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/ZuoSLSP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esorics/2018-2, editor = {Javier L{\'{o}}pez and Jianying Zhou and Miguel Soriano}, title = {Computer Security - 23rd European Symposium on Research in Computer Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11099}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-98989-1}, doi = {10.1007/978-3-319-98989-1}, isbn = {978-3-319-98988-4}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/2018-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.