


default search action
19th ESORICS 2014: Wroclaw, Poland
- Miroslaw Kutylowski, Jaideep Vaidya:

Computer Security - ESORICS 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part I. Lecture Notes in Computer Science 8712, Springer 2014, ISBN 978-3-319-11202-2 - Pratyusa K. Manadhata, Sandeep Yadav, Prasad Rao, William G. Horne:

Detecting Malicious Domains via Graph Inference. 1-18 - Nektarios Leontiadis, Nicolas Christin

:
Empirically Measuring WHOIS Misuse. 19-36 - Dominik Herrmann, Karl-Peter Fuchs, Jens Lindemann

, Hannes Federrath:
EncDNS: A Lightweight Privacy-Preserving Name Resolution Service. 37-55 - Mark Simkin, Dominique Schröder

, Andreas Bulling
, Mario Fritz:
Ubic: Bridging the Gap between Digital Cryptography and the Physical World. 56-75 - Moreno Ambrosin

, Christoph Busold, Mauro Conti
, Ahmad-Reza Sadeghi, Matthias Schunter:
Updaticator: Updating Billions of Devices by an Efficient, Scalable and Secure Software Update Distribution over Untrusted Cache-enabled Networks. 76-93 - Diogo Mónica, Carlos Ribeiro

:
Local Password Validation Using Self-Organizing Maps. 94-111 - Liang Feng Zhang, Reihaneh Safavi-Naini:

Verifiable Delegation of Computations with Storage-Verification Trade-off. 112-129 - Tsz Hon Yuen

, Ye Zhang, Siu-Ming Yiu, Joseph K. Liu
:
Identity-Based Encryption with Post-Challenge Auxiliary Inputs for Secure Cloud Applications and Sensor Networks. 130-147 - Xiaofeng Chen, Jin Li, Jian Weng

, Jianfeng Ma, Wenjing Lou:
Verifiable Computation over Large Database with Incremental Updates. 148-162 - Chao Yang, Zhaoyan Xu, Guofei Gu, Vinod Yegneswaran, Phillip A. Porras:

DroidMiner: Automated Mining and Characterization of Fine-grained Malicious Behaviors in Android Applications. 163-182 - Guillermo Suarez-Tangil

, Mauro Conti
, Juan E. Tapiador
, Pedro Peris-Lopez
:
Detecting Targeted Smartphone Malware with Behavior-Triggering Stochastic Models. 183-201 - He Sun, Kun Sun, Yuewu Wang, Jiwu Jing, Sushil Jajodia

:
TrustDump: Reliable Memory Acquisition on Smartphones. 202-218 - Fengwei Zhang, Haining Wang, Kevin Leach, Angelos Stavrou

:
A Framework to Secure Peripherals at Runtime. 219-238 - Monir Azraoui, Kaoutar Elkhiyaoui, Refik Molva

, Melek Önen
:
StealthGuard: Proofs of Retrievability with Hidden Watchdogs. 239-256 - Kaitai Liang

, Joseph K. Liu
, Duncan S. Wong, Willy Susilo
:
An Efficient Cloud-Based Revocable Identity-Based Proxy Re-encryption Scheme for Public Clouds Data Sharing. 257-272 - Junzuo Lai, Robert H. Deng

, HweeHwa Pang
, Jian Weng
:
Verifiable Computation on Outsourced Encrypted Data. 273-291 - Gang Xu, George T. Amariucai, Yong Guan:

Verifiable Computation with Reduced Informational Costs and Computational Costs. 292-309 - Min Li, Zili Zha, Wanyu Zang, Meng Yu, Peng Liu, Kun Bai:

Detangling Resource Management Functions from the TCB in Privacy-Preserving Virtualization. 310-325 - Yujue Wang, Qianhong Wu, Duncan S. Wong, Bo Qin, Sherman S. M. Chow

, Zhen Liu, Xiao Tan:
Securely Outsourcing Exponentiations with Single Untrusted Program for Cloud Storage. 326-343 - John C. Mace, Charles Morisset, Aad P. A. van Moorsel:

Quantitative Workflow Resiliency. 344-361 - Hua Deng, Qianhong Wu, Bo Qin, Jian Mao, Xiao Liu, Lei Zhang, Wenchang Shi:

Who Is Touching My Cloud. 362-379 - Changyu Dong, Liqun Chen

:
A Fast Single Server Private Information Retrieval Protocol with Low Communication Cost. 380-399 - Bharath Kumar Samanthula, Wei Jiang, Elisa Bertino:

Privacy-Preserving Complex Query Evaluation over Semantically Secure Encrypted Data. 400-418 - Jie Shi, Junzuo Lai, Yingjiu Li, Robert H. Deng

, Jian Weng
:
Authorized Keyword Search on Encrypted Data. 419-435 - Bertram Poettering, Douglas Stebila

:
Double-Authentication-Preventing Signatures. 436-453 - Yongge Wang

, Tony Nicol:
Statistical Properties of Pseudo Random Sequences and Experiments with PHP and Debian OpenSSL. 454-471 - Tran Viet Xuan Phuong, Guomin Yang

, Willy Susilo
:
Efficient Hidden Vector Encryption with Constant-Size Ciphertext. 472-487 - Naveed Ahmed, Christina Pöpper

, Srdjan Capkun:
Enabling Short Fragments for Uncoordinated Spread Spectrum Communication. 488-507 - Tao Wang, Yao Liu, Jay Ligatti:

Fingerprinting Far Proximity from Radio Emissions. 508-525 - Yuexin Zhang, Yang Xiang

, Xinyi Huang, Li Xu:
A Cross-Layer Key Establishment Scheme in Wireless Mesh Networks. 526-541

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














