The SCEAS System
Navigation Menu

Conferences in DBLP

European Symposium on Research in Computer Security (ESORICS) (esorics)
2010 (conf/esorics/2010)


  1. A New Framework for RFID Privacy. [Citation Graph (, )][DBLP]


  2. Readers Behaving Badly - Reader Revocation in PKI-Based RFID Systems. [Citation Graph (, )][DBLP]


  3. Privacy-Preserving, Taxable Bank Accounts. [Citation Graph (, )][DBLP]


  4. Formal Analysis of Privacy for Vehicular Mix-Zones. [Citation Graph (, )][DBLP]


  5. IntPatch: Automatically Fix Integer-Overflow-to-Buffer-Overflow Vulnerability at Compile-Time. [Citation Graph (, )][DBLP]


  6. A Theory of Runtime Enforcement, with Results. [Citation Graph (, )][DBLP]


  7. Enforcing Secure Object Initialization in Java. [Citation Graph (, )][DBLP]


  8. Flexible Scheduler-Independent Security. [Citation Graph (, )][DBLP]


  9. Secure Multiparty Linear Programming Using Fixed-Point Arithmetic. [Citation Graph (, )][DBLP]


  10. A Certifying Compiler for Zero-Knowledge Proofs of Knowledge Based on Sigma-Protocols. [Citation Graph (, )][DBLP]


  11. Short Generic Transformation to Strongly Unforgeable Signature in the Standard Model. [Citation Graph (, )][DBLP]


  12. DR@FT: Efficient Remote Attestation Framework for Dynamic Systems. [Citation Graph (, )][DBLP]


  13. Website Fingerprinting and Identification Using Ordered Feature Sequences. [Citation Graph (, )][DBLP]


  14. Web Browser History Detection as a Real-World Privacy Threat. [Citation Graph (, )][DBLP]


  15. On the Secrecy of Spread-Spectrum Flow Watermarks. [Citation Graph (, )][DBLP]


  16. Traffic Analysis against Low-Latency Anonymity Networks Using Available Bandwidth Estimation. [Citation Graph (, )][DBLP]


  17. A Hierarchical Adaptive Probabilistic Approach for Zero Hour Phish Detection. [Citation Graph (, )][DBLP]


  18. Kamouflage: Loss-Resistant Password Management. [Citation Graph (, )][DBLP]


  19. Sequential Protocol Composition in Maude-NPA. [Citation Graph (, )][DBLP]


  20. Verifying Security Property of Peer-to-Peer Systems Using CSP. [Citation Graph (, )][DBLP]


  21. Modeling and Analyzing Security in the Presence of Compromising Adversaries. [Citation Graph (, )][DBLP]


  22. On Bounding Problems of Quantitative Information Flow. [Citation Graph (, )][DBLP]


  23. On E-Vote Integrity in the Case of Malicious Voter Computers. [Citation Graph (, )][DBLP]


  24. Election Verifiability in Electronic Voting Protocols. [Citation Graph (, )][DBLP]


  25. Pretty Good Democracy for More Expressive Voting Schemes. [Citation Graph (, )][DBLP]


  26. Efficient Multi-dimensional Key Management in Broadcast Services. [Citation Graph (, )][DBLP]


  27. Caught in the Maze of Security Standards. [Citation Graph (, )][DBLP]


  28. User-Role Reachability Analysis of Evolving Administrative Role Based Access Control. [Citation Graph (, )][DBLP]


  29. An Authorization Framework Resilient to Policy Evaluation Failures. [Citation Graph (, )][DBLP]


  30. Optimistic Fair Exchange with Multiple Arbiters. [Citation Graph (, )][DBLP]


  31. Speaker Recognition in Encrypted Voice Streams. [Citation Graph (, )][DBLP]


  32. Evaluating Adversarial Partitions. [Citation Graph (, )][DBLP]


  33. Providing Mobile Users' Anonymity in Hybrid Networks. [Citation Graph (, )][DBLP]


  34. Complexity of Anonymity for Security Protocols. [Citation Graph (, )][DBLP]


  35. k-Zero Day Safety: Measuring the Security Risk of Networks against Unknown Attacks. [Citation Graph (, )][DBLP]


  36. Are Security Experts Useful? Bayesian Nash Equilibria for Network Security Games with Limited Information. [Citation Graph (, )][DBLP]


  37. RatFish: A File Sharing Protocol Provably Secure against Rational Users. [Citation Graph (, )][DBLP]


  38. A Service Dependency Model for Cost-Sensitive Intrusion Response. [Citation Graph (, )][DBLP]


  39. Secure Code Update for Embedded Devices via Proofs of Secure Erasure. [Citation Graph (, )][DBLP]


  40. D(e|i)aling with VoIP: Robust Prevention of DIAL Attacks. [Citation Graph (, )][DBLP]


  41. Low-Cost Client Puzzles Based on Modular Exponentiation. [Citation Graph (, )][DBLP]


  42. Expressive, Efficient and Obfuscation Resilient Behavior Based IDS. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002