default search action
19th ESORICS 2014: Wroclaw, Poland
- Miroslaw Kutylowski, Jaideep Vaidya:
Computer Security - ESORICS 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part I. Lecture Notes in Computer Science 8712, Springer 2014, ISBN 978-3-319-11202-2 - Pratyusa K. Manadhata, Sandeep Yadav, Prasad Rao, William G. Horne:
Detecting Malicious Domains via Graph Inference. 1-18 - Nektarios Leontiadis, Nicolas Christin:
Empirically Measuring WHOIS Misuse. 19-36 - Dominik Herrmann, Karl-Peter Fuchs, Jens Lindemann, Hannes Federrath:
EncDNS: A Lightweight Privacy-Preserving Name Resolution Service. 37-55 - Mark Simkin, Dominique Schröder, Andreas Bulling, Mario Fritz:
Ubic: Bridging the Gap between Digital Cryptography and the Physical World. 56-75 - Moreno Ambrosin, Christoph Busold, Mauro Conti, Ahmad-Reza Sadeghi, Matthias Schunter:
Updaticator: Updating Billions of Devices by an Efficient, Scalable and Secure Software Update Distribution over Untrusted Cache-enabled Networks. 76-93 - Diogo Mónica, Carlos Ribeiro:
Local Password Validation Using Self-Organizing Maps. 94-111 - Liang Feng Zhang, Reihaneh Safavi-Naini:
Verifiable Delegation of Computations with Storage-Verification Trade-off. 112-129 - Tsz Hon Yuen, Ye Zhang, Siu-Ming Yiu, Joseph K. Liu:
Identity-Based Encryption with Post-Challenge Auxiliary Inputs for Secure Cloud Applications and Sensor Networks. 130-147 - Xiaofeng Chen, Jin Li, Jian Weng, Jianfeng Ma, Wenjing Lou:
Verifiable Computation over Large Database with Incremental Updates. 148-162 - Chao Yang, Zhaoyan Xu, Guofei Gu, Vinod Yegneswaran, Phillip A. Porras:
DroidMiner: Automated Mining and Characterization of Fine-grained Malicious Behaviors in Android Applications. 163-182 - Guillermo Suarez-Tangil, Mauro Conti, Juan E. Tapiador, Pedro Peris-Lopez:
Detecting Targeted Smartphone Malware with Behavior-Triggering Stochastic Models. 183-201 - He Sun, Kun Sun, Yuewu Wang, Jiwu Jing, Sushil Jajodia:
TrustDump: Reliable Memory Acquisition on Smartphones. 202-218 - Fengwei Zhang, Haining Wang, Kevin Leach, Angelos Stavrou:
A Framework to Secure Peripherals at Runtime. 219-238 - Monir Azraoui, Kaoutar Elkhiyaoui, Refik Molva, Melek Önen:
StealthGuard: Proofs of Retrievability with Hidden Watchdogs. 239-256 - Kaitai Liang, Joseph K. Liu, Duncan S. Wong, Willy Susilo:
An Efficient Cloud-Based Revocable Identity-Based Proxy Re-encryption Scheme for Public Clouds Data Sharing. 257-272 - Junzuo Lai, Robert H. Deng, HweeHwa Pang, Jian Weng:
Verifiable Computation on Outsourced Encrypted Data. 273-291 - Gang Xu, George T. Amariucai, Yong Guan:
Verifiable Computation with Reduced Informational Costs and Computational Costs. 292-309 - Min Li, Zili Zha, Wanyu Zang, Meng Yu, Peng Liu, Kun Bai:
Detangling Resource Management Functions from the TCB in Privacy-Preserving Virtualization. 310-325 - Yujue Wang, Qianhong Wu, Duncan S. Wong, Bo Qin, Sherman S. M. Chow, Zhen Liu, Xiao Tan:
Securely Outsourcing Exponentiations with Single Untrusted Program for Cloud Storage. 326-343 - John C. Mace, Charles Morisset, Aad P. A. van Moorsel:
Quantitative Workflow Resiliency. 344-361 - Hua Deng, Qianhong Wu, Bo Qin, Jian Mao, Xiao Liu, Lei Zhang, Wenchang Shi:
Who Is Touching My Cloud. 362-379 - Changyu Dong, Liqun Chen:
A Fast Single Server Private Information Retrieval Protocol with Low Communication Cost. 380-399 - Bharath Kumar Samanthula, Wei Jiang, Elisa Bertino:
Privacy-Preserving Complex Query Evaluation over Semantically Secure Encrypted Data. 400-418 - Jie Shi, Junzuo Lai, Yingjiu Li, Robert H. Deng, Jian Weng:
Authorized Keyword Search on Encrypted Data. 419-435 - Bertram Poettering, Douglas Stebila:
Double-Authentication-Preventing Signatures. 436-453 - Yongge Wang, Tony Nicol:
Statistical Properties of Pseudo Random Sequences and Experiments with PHP and Debian OpenSSL. 454-471 - Tran Viet Xuan Phuong, Guomin Yang, Willy Susilo:
Efficient Hidden Vector Encryption with Constant-Size Ciphertext. 472-487 - Naveed Ahmed, Christina Pöpper, Srdjan Capkun:
Enabling Short Fragments for Uncoordinated Spread Spectrum Communication. 488-507 - Tao Wang, Yao Liu, Jay Ligatti:
Fingerprinting Far Proximity from Radio Emissions. 508-525 - Yuexin Zhang, Yang Xiang, Xinyi Huang, Li Xu:
A Cross-Layer Key Establishment Scheme in Wireless Mesh Networks. 526-541
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.