ESORICS A

42 papers

YearTitle / Authors
2010A Certifying Compiler for Zero-Knowledge Proofs of Knowledge Based on Sigma-Protocols.
José Bacelar Almeida, Endre Bangerter, Manuel Barbosa, Stephan Krenn, Ahmad-Reza Sadeghi, Thomas Schneider
2010A Hierarchical Adaptive Probabilistic Approach for Zero Hour Phish Detection.
Guang Xiang, Bryan A. Pendleton, Jason I. Hong, Carolyn P. Rosé
2010A New Framework for RFID Privacy.
Robert H. Deng, Yingjiu Li, Moti Yung, Yunlei Zhao
2010A Service Dependency Model for Cost-Sensitive Intrusion Response.
Nizar Kheir, Nora Cuppens-Boulahia, Frédéric Cuppens, Hervé Debar
2010A Theory of Runtime Enforcement, with Results.
Jay Ligatti, Srikar Reddy
2010An Authorization Framework Resilient to Policy Evaluation Failures.
Jason Crampton, Michael Huth
2010Are Security Experts Useful? Bayesian Nash Equilibria for Network Security Games with Limited Information.
Benjamin Johnson, Jens Grossklags, Nicolas Christin, John Chuang
2010Caught in the Maze of Security Standards.
Jan Meier, Dieter Gollmann
2010Complexity of Anonymity for Security Protocols.
Ferucio Laurentiu Tiplea, Loredana Vamanu, Cosmin Vârlan
2010Computer Security - ESORICS 2010, 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings
Dimitris Gritzalis, Bart Preneel, Marianthi Theoharidou
2010D(e|i)aling with VoIP: Robust Prevention of DIAL Attacks.
Alexandros Kapravelos, Iasonas Polakis, Elias Athanasopoulos, Sotiris Ioannidis, Evangelos P. Markatos
2010DR@FT: Efficient Remote Attestation Framework for Dynamic Systems.
Wenjuan Xu, Gail-Joon Ahn, Hongxin Hu, Xinwen Zhang, Jean-Pierre Seifert
2010Efficient Multi-dimensional Key Management in Broadcast Services.
Marina Blanton, Keith B. Frikken
2010Election Verifiability in Electronic Voting Protocols.
Steve Kremer, Mark Ryan, Ben Smyth
2010Enforcing Secure Object Initialization in Java.
Laurent Hubert, Thomas P. Jensen, Vincent Monfort, David Pichardie
2010Evaluating Adversarial Partitions.
Andreas Pashalidis, Stefan Schiffner
2010Expressive, Efficient and Obfuscation Resilient Behavior Based IDS.
Arnur G. Tokhtabayev, Victor A. Skormin, Andrey M. Dolgikh
2010Flexible Scheduler-Independent Security.
Heiko Mantel, Henning Sudbrock
2010Formal Analysis of Privacy for Vehicular Mix-Zones.
Morten Dahl, Stéphanie Delaune, Graham Steel
2010IntPatch: Automatically Fix Integer-Overflow-to-Buffer-Overflow Vulnerability at Compile-Time.
Chao Zhang, Tielei Wang, Tao Wei, Yu Chen, Wei Zou
2010Kamouflage: Loss-Resistant Password Management.
Hristo Bojinov, Elie Bursztein, Xavier Boyen, Dan Boneh
2010Low-Cost Client Puzzles Based on Modular Exponentiation.
Ghassan Karame, Srdjan Capkun
2010Modeling and Analyzing Security in the Presence of Compromising Adversaries.
David A. Basin, Cas Cremers
2010On Bounding Problems of Quantitative Information Flow.
Hirotoshi Yasuoka, Tachio Terauchi
2010On E-Vote Integrity in the Case of Malicious Voter Computers.
Sven Heiberg, Helger Lipmaa, Filip van Laenen
2010On the Secrecy of Spread-Spectrum Flow Watermarks.
Xiapu Luo, Junjie Zhang, Roberto Perdisci, Wenke Lee
2010Optimistic Fair Exchange with Multiple Arbiters.
Alptekin Küpçü, Anna Lysyanskaya
2010Pretty Good Democracy for More Expressive Voting Schemes.
James Heather, Peter Y. A. Ryan, Vanessa Teague
2010Privacy-Preserving, Taxable Bank Accounts.
Elli Androulaki, Binh Vo, Steven M. Bellovin
2010Providing Mobile Users' Anonymity in Hybrid Networks.
Claudio A. Ardagna, Sushil Jajodia, Pierangela Samarati, Angelos Stavrou
2010RatFish: A File Sharing Protocol Provably Secure against Rational Users.
Michael Backes, Oana Ciobotaru, Anton Krohmer
2010Readers Behaving Badly - Reader Revocation in PKI-Based RFID Systems.
Rishab Nithyanand, Gene Tsudik, Ersin Uzun
2010Secure Code Update for Embedded Devices via Proofs of Secure Erasure.
Daniele Perito, Gene Tsudik
2010Secure Multiparty Linear Programming Using Fixed-Point Arithmetic.
Octavian Catrina, Sebastiaan de Hoogh
2010Sequential Protocol Composition in Maude-NPA.
Santiago Escobar, Catherine Meadows, José Meseguer, Sonia Santiago
2010Short Generic Transformation to Strongly Unforgeable Signature in the Standard Model.
Joseph K. Liu, Man Ho Au, Willy Susilo, Jianying Zhou
2010Speaker Recognition in Encrypted Voice Streams.
Michael Backes, Goran Doychev, Markus Dürmuth, Boris Köpf
2010Traffic Analysis against Low-Latency Anonymity Networks Using Available Bandwidth Estimation.
Sambuddho Chakravarty, Angelos Stavrou, Angelos D. Keromytis
2010User-Role Reachability Analysis of Evolving Administrative Role Based Access Control.
Mikhail I. Gofman, Ruiqi Luo, Ping Yang
2010Verifying Security Property of Peer-to-Peer Systems Using CSP.
Tien Tuan Anh Dinh, Mark Ryan
2010Web Browser History Detection as a Real-World Privacy Threat.
Artur Janc, Lukasz Olejnik
2010Website Fingerprinting and Identification Using Ordered Feature Sequences.
Liming Lu, Ee-Chien Chang, Mun Choon Chan