default search action
16th ESORICS 2011: Leuven, Belgium
- Vijay Atluri, Claudia Díaz:
Computer Security - ESORICS 2011 - 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings. Lecture Notes in Computer Science 6879, Springer 2011, ISBN 978-3-642-23821-5
Wireless Security
- Nashad Ahmed Safa, Saikat Sarkar, Reihaneh Safavi-Naini, Majid Ghaderi:
Secure Localization Using Dynamic Verifiers. 1-20 - Diogo Mónica, Carlos Ribeiro:
WiFiHop - Mitigating the Evil Twin Attack through Multi-hop Detection. 21-39 - Christina Pöpper, Nils Ole Tippenhauer, Boris Danev, Srdjan Capkun:
Investigation of Signal and Message Manipulations on the Wireless Channel. 40-59
Web Security I
- Yuchen Zhou, David Evans:
Protecting Private Web Content from Embedded Scripts. 60-79 - Raymond Mui, Phyllis G. Frankl:
Preventing Web Application Injections with Complementary Character Coding. 80-99 - Philippe De Ryck, Lieven Desmet, Wouter Joosen, Frank Piessens:
Automatic and Precise Client-Side Protection against CSRF Attacks. 100-116
Web Security II
- Gunnar Kreitz:
Timing Is Everything: The Importance of History Detection. 117-132 - Elie Bursztein, Baptiste Gourdin, John C. Mitchell:
Reclaiming the Blogosphere, TalkBack: A Secure LinkBack Protocol for Weblogs. 133-149 - Joel Weinberger, Prateek Saxena, Devdatta Akhawe, Matthew Finifter, Eui Chul Richard Shin, Dawn Song:
A Systematic Analysis of XSS Sanitization in Web Application Frameworks. 150-171
Forensics, Biometrics and Software Protection
- Nathan E. Rosenblum, Xiaojin Zhu, Barton P. Miller:
Who Wrote This Code? Identifying the Authors of Program Binaries. 172-189 - Marina Blanton, Paolo Gasti:
Secure and Efficient Protocols for Iris and Fingerprint Identification. 190-209 - Zhi Wang, Jiang Ming, Chunfu Jia, Debin Gao:
Linear Obfuscation to Combat Symbolic Execution. 210-226 - Yueqiang Cheng, Xuhua Ding, Robert H. Deng:
DriverGuard: A Fine-Grained Protection on I/O Flows. 227-244
Access Control
- Jason Crampton:
Time-Storage Trade-Offs for Cryptographically-Enforced Access Control. 245-261 - Steve Barker, Valerio Genovese:
Socially Constructed Trust for Distributed Authorization. 262-277 - Zhen Liu, Zhenfu Cao, Qiong Huang, Duncan S. Wong, Tsz Hon Yuen:
Fully Secure Multi-authority Ciphertext-Policy Attribute-Based Encryption without Random Oracles. 278-297
Cryptography and Protocol Analysis
- Dominique Schröder:
How to Aggregate the CL Signature Scheme. 298-314 - Cas Cremers:
Key Exchange in IPsec Revisited: Formal Analysis of IKEv1 and IKEv2. 315-334 - David Bernhard, Véronique Cortier, Olivier Pereira, Ben Smyth, Bogdan Warinschi:
Adapting Helios for Provable Ballot Privacy. 335-354
Information Flow, Side Channels, and Vulnerability Analysis
- Billy Bob Brumley, Nicola Tuveri:
Remote Timing Attacks Are Still Practical. 355-371 - Arnar Birgisson, Andrei Sabelfeld:
Multi-run Security. 372-391 - Sören Bleikertz, Thomas Groß, Matthias Schunter, Konrad Eriksson:
Automated Information Flow Analysis of Virtualized Infrastructures. 392-415 - Massimiliano Albanese, Sushil Jajodia, Andrea Pugliese, V. S. Subrahmanian:
Scalable Analysis of Attack Scenarios. 416-433
Usability, Ttrust, and Economics of Security and Privacy
- Alfred Kobsa, Rishab Nithyanand, Gene Tsudik, Ersin Uzun:
Usability of Display-Equipped RFID Tags for Security Purposes. 434-451 - Amir Herzberg, Ronen Margulies:
Forcing Johnny to Login Safely - Long-Term User Study of Forcing and Training Login Mechanisms. 452-471 - Piero A. Bonatti, Marco Faella, Clemente Galdi, Luigi Sauro:
Towards a Mechanism for Incentivating Privacy. 472-488 - Alexander Ulrich, Ralph Holz, Peter Hauck, Georg Carle:
Investigating the OpenPGP Web of Trust. 489-507
Privacy I
- Dang Vinh Pham, Joss Wright, Dogan Kesdogan:
A Practical Complexity-Theoretic Analysis of Mix Systems. 508-527 - Ka Yang, Jinsheng Zhang, Wensheng Zhang, Daji Qiao:
A Light-Weight Solution to Preservation of Access Pattern Privacy in Un-trusted Clouds. 528-547 - Murtuza Jadliwala, Igor Bilogrevic, Jean-Pierre Hubaux:
Optimizing Mixing in Pervasive Networks: A Graph-Theoretic Perspective. 548-567
Privacy II
- Jens Hermans, Andreas Pashalidis, Frederik Vercauteren, Bart Preneel:
A New RFID Privacy Model. 568-587 - Michele Boreale, Francesca Pampaloni, Michela Paolini:
Quantitative Information Flow, with a View. 588-606 - Xiao-yong Zhou, Bo Peng, Yong Fuga Li, Yangyi Chen, Haixu Tang, XiaoFeng Wang:
To Release or Not to Release: Evaluating Information Leaks in Aggregate Human-Genome Data. 607-627
Privacy III
- Nicholas L. Farnan, Adam J. Lee, Panos K. Chrysanthis, Ting Yu:
Don't Reveal My Intension: Protecting User Privacy Using Declarative Preferences during Distributed Query Processing. 628-647 - Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Gerardo Pelosi, Pierangela Samarati:
Supporting Concurrency in Private Data Outsourcing. 648-664 - Hannes Federrath, Karl-Peter Fuchs, Dominik Herrmann, Christopher Piosecny:
Privacy-Preserving DNS: Analysis of Broadcast, Range Queries and Mix-Based Protection Methods. 665-683
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.