The SCEAS System
Navigation Menu

Conferences in DBLP

European Symposium on Research in Computer Security (ESORICS) (esorics)
2009 (conf/esorics/2009)


  1. Learning More about the Underground Economy: A Case-Study of Keyloggers and Dropzones. [Citation Graph (, )][DBLP]


  2. User-Centric Handling of Identity Agent Compromise. [Citation Graph (, )][DBLP]


  3. The Coremelt Attack. [Citation Graph (, )][DBLP]


  4. Type-Based Analysis of PIN Processing APIs. [Citation Graph (, )][DBLP]


  5. Declassification with Explicit Reference Points. [Citation Graph (, )][DBLP]


  6. Tracking Information Flow in Dynamic Tree Structures. [Citation Graph (, )][DBLP]


  7. Lightweight Opportunistic Tunneling (LOT). [Citation Graph (, )][DBLP]


  8. Hide and Seek in Time - Robust Covert Timing Channels. [Citation Graph (, )][DBLP]


  9. Authentic Time-Stamps for Archival Storage. [Citation Graph (, )][DBLP]


  10. Towards a Theory of Accountability and Audit. [Citation Graph (, )][DBLP]


  11. Reliable Evidence: Auditability by Typing. [Citation Graph (, )][DBLP]


  12. PCAL: Language Support for Proof-Carrying Authorization Systems. [Citation Graph (, )][DBLP]


  13. ReFormat: Automatic Reverse Engineering of Encrypted Messages. [Citation Graph (, )][DBLP]


  14. Protocol Normalization Using Attribute Grammars. [Citation Graph (, )][DBLP]


  15. Automatically Generating Models for Botnet Detection. [Citation Graph (, )][DBLP]


  16. Dynamic Enforcement of Abstract Separation of Duty Constraints. [Citation Graph (, )][DBLP]


  17. Usable Access Control in Collaborative Environments: Authorization Based on People-Tagging. [Citation Graph (, )][DBLP]


  18. Requirements and Protocols for Inference-Proof Interactions in Information Systems. [Citation Graph (, )][DBLP]


  19. A Privacy Preservation Model for Facebook-Style Social Network Systems. [Citation Graph (, )][DBLP]


  20. New Privacy Results on Synchronized RFID Authentication Protocols against Tag Tracing. [Citation Graph (, )][DBLP]


  21. Secure Pseudonymous Channels. [Citation Graph (, )][DBLP]


  22. Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing. [Citation Graph (, )][DBLP]


  23. Content Delivery Networks: Protection or Threat? [Citation Graph (, )][DBLP]


  24. Model-Checking DoS Amplification for VoIP Session Initiation. [Citation Graph (, )][DBLP]


  25. The Wisdom of Crowds: Attacks and Optimal Constructions. [Citation Graph (, )][DBLP]


  26. Secure Evaluation of Private Linear Branching Programs with Medical Applications. [Citation Graph (, )][DBLP]


  27. Keep a Few: Outsourcing Data While Maintaining Confidentiality. [Citation Graph (, )][DBLP]


  28. Data Structures with Unpredictable Timing. [Citation Graph (, )][DBLP]


  29. WORM-SEAL: Trustworthy Data Retention and Verification for Regulatory Compliance. [Citation Graph (, )][DBLP]


  30. Corruption-Localizing Hashing. [Citation Graph (, )][DBLP]


  31. Isolating JavaScript with Filters, Rewriting, and Wrappers. [Citation Graph (, )][DBLP]


  32. An Effective Method for Combating Malicious Scripts Clickbots. [Citation Graph (, )][DBLP]


  33. Client-Side Detection of XSS Worms by Monitoring Payload Propagation. [Citation Graph (, )][DBLP]


  34. Formal Indistinguishability Extended to the Random Oracle Model. [Citation Graph (, )][DBLP]


  35. Computationally Sound Analysis of a Probabilistic Contract Signing Protocol. [Citation Graph (, )][DBLP]


  36. Attribute-Sets: A Practically Motivated Enhancement to Attribute-Based Encryption. [Citation Graph (, )][DBLP]


  37. A Generic Security API for Symmetric Key Management on Cryptographic Devices. [Citation Graph (, )][DBLP]


  38. ID-Based Secure Distance Bounding and Localization. [Citation Graph (, )][DBLP]


  39. Secure Ownership and Ownership Transfer in RFID Systems. [Citation Graph (, )][DBLP]


  40. Cumulative Attestation Kernels for Embedded Systems. [Citation Graph (, )][DBLP]


  41. Super-Efficient Aggregating History-Independent Persistent Authenticated Dictionaries. [Citation Graph (, )][DBLP]


  42. Set Covering Problems in Role-Based Access Control. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002