default search action
22nd ESORICS 2017: Oslo, Norway
- Simon N. Foley, Dieter Gollmann, Einar Snekkenes:
Computer Security - ESORICS 2017 - 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part I. Lecture Notes in Computer Science 10492, Springer 2017, ISBN 978-3-319-66401-9 - Sandro Etalle:
From Intrusion Detection to Software Design. 1-10 - Cormac Herley:
Justifying Security Measures - a Position Paper. 11-17 - Paul Syverson:
The Once and Future Onion. 18-28 - Martin R. Albrecht, Emmanuela Orsini, Kenneth G. Paterson, Guy Peer, Nigel P. Smart:
Tightly Secure Ring-LWE Based Key Encapsulation with Short Ciphertexts. 29-46 - James Alderman, Naomi Farley, Jason Crampton:
Tree-Based Cryptographic Access Control. 47-64 - Bander Alsulami, Edwin Dauber, Richard E. Harang, Spiros Mancoridis, Rachel Greenstadt:
Source Code Authorship Attribution Using Long Short-Term Memory Based Networks. 65-82 - Maxime Audinot, Sophie Pinchinat, Barbara Kordy:
Is My Attack Tree Correct? 83-102 - Foteini Baldimtsi, Dimitrios Papadopoulos, Stavros Papadopoulos, Alessandra Scafuro, Nikos Triandopoulos:
Server-Aided Secure Computation with Off-line Parties. 103-123 - Musard Balliu, Daniel Schoepe, Andrei Sabelfeld:
We Are Family: Relating Information-Flow Trackers. 124-145 - Manuel Barbosa, Dario Catalano, Dario Fiore:
Labeled Homomorphic Encryption - Scalable and Privacy-Preserving Processing of Outsourced Data. 146-166 - Alexandru G. Bardas, Sathya Chandran Sundaramurthy, Xinming Ou, Scott A. DeLoach:
MTD CBITS: Moving Target Defense for Cloud-Based IT Systems. 167-186 - Matthew S. Bauer, Rohit Chadha, Mahesh Viswanathan:
Modular Verification of Protocol Equivalence in the Presence of Randomness. 187-205 - Fabrice Benhamouda, Houda Ferradi, Rémi Géraud, David Naccache:
Non-interactive Provably Secure Attestations for Arbitrary RSA Prime Generation Algorithms. 206-223 - Marc Beunardeau, Aisling Connolly, Houda Ferradi, Rémi Géraud, David Naccache, Damien Vergnaud:
Reusing Nonces in Schnorr Signatures - (and Keeping It Secure...). 224-241 - Abhishek Bichhawat, Vineet Rajani, Jinank Jain, Deepak Garg, Christian Hammer:
WebPol: Fine-Grained Information Flow Policies for Web Browsers. 242-259 - Sandrine Blazy, David Pichardie, Alix Trieu:
Verifying Constant-Time Implementations by Abstract Interpretation. 260-277 - Lorenzo Bordoni, Mauro Conti, Riccardo Spolaor:
Mirage: Toward a Stealthier and Modular Malware Analysis Sandbox for Android. 278-296 - Jacqueline Brendel, Marc Fischlin:
Zero Round-Trip Time for the Extended Access Control Protocol. 297-314 - Ahto Buldas, Aivo Kalu, Peeter Laud, Mart Oruaas:
Server-Supported RSA Signatures for Mobile Devices. 315-333 - Hervé Chabanne, Rodolphe Hugel, Julien Keuffer:
Verifiable Document Redacting. 334-351 - Swarup Chandra, Vishal Karande, Zhiqiang Lin, Latifur Khan, Murat Kantarcioglu, Bhavani Thuraisingham:
Securing Data Analytics on SGX with Randomization. 352-369 - Igino Corona, Battista Biggio, Matteo Contini, Luca Piras, Roberto Corda, Mauro Mereu, Guido Mureddu, Davide Ariu, Fabio Roli:
DeltaPhish: Detecting Phishing Webpages in Compromised Websites. 370-388 - Cas Cremers, Martin Dehnel-Wild, Kevin Milner:
Secure Authentication in the Grid: A Formal Analysis of DNP3: SAv5. 389-407 - Grégory Demay, Peter Gazi, Ueli Maurer, Björn Tackmann:
Per-Session Security: Password-Based Cryptography Revisited. 408-426 - Florian Dewald, Heiko Mantel, Alexandra Weber:
AVR Processors as a Platform for Language-Based Security. 427-445 - Kai Engelhardt:
A Better Composition Operator for Quantitative Information Flow Analyses. 446-463 - Sibylle B. Fröschle, Alexander Stühring:
Analyzing the Capabilities of the CAN Attacker. 464-482
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.