default search action
20th ESORICS 2015: Vienna, Austria
- Günther Pernul, Peter Y. A. Ryan, Edgar R. Weippl:
Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part II. Lecture Notes in Computer Science 9327, Springer 2015, ISBN 978-3-319-24176-0
Privacy
- Christof Ferreira Torres, Hugo L. Jonker, Sjouke Mauw:
FP-Block: Usable Web Privacy by Controlling Browser Fingerprinting. 3-19 - Wenrui Diao, Xiangyu Liu, Zhe Zhou, Kehuan Zhang, Zhou Li:
Mind-Reading: Privacy Attacks Exploiting Cross-App KeyEvent Injections. 20-39 - Xingliang Yuan, Helei Cui, Xinyu Wang, Cong Wang:
Enabling Privacy-Assured Similarity Retrieval over Millions of Encrypted Records. 40-60 - Yao Zheng, Bing Wang, Wenjing Lou, Yiwei Thomas Hou:
Privacy-Preserving Link Prediction in Decentralized Online Social Networks. 61-80 - Florian Kerschbaum, Hoon Wei Lim:
Privacy-Preserving Observation in Public Spaces. 81-100 - Qiang Tang, Jun Wang:
Privacy-Preserving Context-Aware Recommender Systems: Analysis and New Solutions. 101-119
Cloud Security
- Sky Faber, Stanislaw Jarecki, Hugo Krawczyk, Quan Nguyen, Marcel-Catalin Rosu, Michael Steiner:
Rich Queries on Encrypted Data: Beyond Exact Matches. 123-145 - Yanjiang Yang, Joseph K. Liu, Kaitai Liang, Kim-Kwang Raymond Choo, Jianying Zhou:
Extended Proxy-Assisted Approach: Achieving Revocable Fine-Grained Encryption of Cloud Data. 146-166 - Liang Feng Zhang, Reihaneh Safavi-Naini:
Batch Verifiable Computation of Polynomials on Outsourced Data. 167-185 - Qian Wang, Shengshan Hu, Kui Ren, Meiqi He, Minxin Du, Zhibo Wang:
CloudBI: Practical Privacy-Preserving Outsourcing of Biometric Identification in the Cloud. 186-205
Protocols and Attribute-Based Encryption
- Omar Almousa, Sebastian Mödersheim, Paolo Modesti, Luca Viganò:
Typing and Compositionality for Security Protocols: A Generalization to the Geometric Fragment. 209-229 - Rémy Chrétien, Véronique Cortier, Stéphanie Delaune:
Checking Trace Equivalence: How to Get Rid of Nonces? 230-251 - Tran Viet Xuan Phuong, Guomin Yang, Willy Susilo, Xiaofeng Chen:
Attribute Based Broadcast Encryption with Short Ciphertext and Decryption Key. 252-269 - Jianting Ning, Xiaolei Dong, Zhenfu Cao, Lifei Wei:
Accountable Authority Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability and Public Auditing in the Cloud. 270-289
Code Analysis and Side-Channels
- Yueqian Zhang, Xiapu Luo, Haoyang Yin:
DexHunter: Toward Extracting Hidden Code from Packed Android Applications. 293-311 - Hong Hu, Zheng Leong Chua, Zhenkai Liang, Prateek Saxena:
Identifying Arbitrary Memory Access Vulnerabilities in Privilege-Separated Software. 312-331 - Wei Wang, Jingqiang Lin, Zhan Wang, Ze Wang, Luning Xia:
vBox: Proactively Establishing Secure Channels Between Wireless Devices Without Prior Knowledge. 332-351
Detection and Monitoring
- Sufatrio, Tong-Wei Chua, Darell J. J. Tan, Vrizlynn L. L. Thing:
Accurate Specification for Robust Detection of Malicious Behavior in Mobile Environments. 355-375 - Maximilian Seitzer, Michael Gruhn, Tilo Müller:
A Bytecode Interpreter for Secure Program Execution in Untrusted Main Memory. 376-395 - Youngja Park, Ian M. Molloy, Suresh N. Chari, Zenglin Xu, Christopher S. Gates, Ninghui Li:
Learning from Others: User Anomaly Detection Using Anomalous Samples from Other Users. 396-414
Authentication
- Jingyu Hua, Shaoyong Du, Sheng Zhong:
Towards Attack-Resistant Peer-Assisted Indoor Localization. 417-437 - Mahdi Nasrullah Al-Ameen, Kanis Fatema, Matthew K. Wright, Shannon Scielzo:
Leveraging Real-Life Facts to Make Random Passwords More Memorable. 438-455 - Ding Wang, Ping Wang:
The Emperor's New Password Creation Policies: An Evaluation of Leading Web Services and the Effect of Role in Resisting Against Online Guessing. 456-477
Policies
- Donald Ray, Jay Ligatti:
A Theory of Gray Security Policies. 481-499 - Ximeng Li, Flemming Nielson, Hanne Riis Nielson:
Factorization of Behavioral Integrity. 500-519 - Kristopher K. Micinski, Jonathan Fetter-Degges, Jinseong Jeon, Jeffrey S. Foster, Michael R. Clarkson:
Checking Interaction-Based Declassification Policies for Android Using Symbolic Execution. 520-538
Applied Security
- Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes:
Enhancing Java Runtime Environment for Smart Cards Against Runtime Attacks. 541-560 - Christian Decker, James Guthrie, Jochen Seidel, Roger Wattenhofer:
Making Bitcoin Exchanges Transparent. 561-576 - Behnaz Hassanshahi, Yaoqi Jia, Roland H. C. Yap, Prateek Saxena, Zhenkai Liang:
Web-to-Application Injection Attacks on Android: Characterization and Detection. 577-598 - Dibya Mukhopadhyay, Maliheh Shirvanian, Nitesh Saxena:
All Your Voices are Belong to Us: Stealing Voices to Fool Humans and Machines. 599-621 - Tobias Pulls, Roel Peeters:
Balloon: A Forward-Secure Append-Only Persistent Authenticated Data Structure. 622-641 - Léa El Samarji, Nora Cuppens-Boulahia, Frédéric Cuppens, Serge Papillon, Waël Kanoun, Samuel Dubus:
On the Fly Design and Co-simulation of Responses Against Simultaneous Attacks. 642-661
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.