default search action
15th ESORICS 2010: Athens, Greece
- Dimitris Gritzalis, Bart Preneel, Marianthi Theoharidou:
Computer Security - ESORICS 2010, 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings. Lecture Notes in Computer Science 6345, Springer 2010, ISBN 978-3-642-15496-6
RFID and Privacy
- Robert H. Deng, Yingjiu Li, Moti Yung, Yunlei Zhao:
A New Framework for RFID Privacy. 1-18 - Rishab Nithyanand, Gene Tsudik, Ersin Uzun:
Readers Behaving Badly - Reader Revocation in PKI-Based RFID Systems. 19-36 - Elli Androulaki, Binh Vo, Steven M. Bellovin:
Privacy-Preserving, Taxable Bank Accounts. 37-54 - Morten Dahl, Stéphanie Delaune, Graham Steel:
Formal Analysis of Privacy for Vehicular Mix-Zones. 55-70
Software Security
- Chao Zhang, Tielei Wang, Tao Wei, Yu Chen, Wei Zou:
IntPatch: Automatically Fix Integer-Overflow-to-Buffer-Overflow Vulnerability at Compile-Time. 71-86 - Jay Ligatti, Srikar Reddy:
A Theory of Runtime Enforcement, with Results. 87-100 - Laurent Hubert, Thomas P. Jensen, Vincent Monfort, David Pichardie:
Enforcing Secure Object Initialization in Java. 101-115 - Heiko Mantel, Henning Sudbrock:
Flexible Scheduler-Independent Security. 116-133
Cryptographic Protocols
- Octavian Catrina, Sebastiaan de Hoogh:
Secure Multiparty Linear Programming Using Fixed-Point Arithmetic. 134-150 - José Bacelar Almeida, Endre Bangerter, Manuel Barbosa, Stephan Krenn, Ahmad-Reza Sadeghi, Thomas Schneider:
A Certifying Compiler for Zero-Knowledge Proofs of Knowledge Based on Sigma-Protocols. 151-167 - Joseph K. Liu, Man Ho Au, Willy Susilo, Jianying Zhou:
Short Generic Transformation to Strongly Unforgeable Signature in the Standard Model. 168-181 - Wenjuan Xu, Gail-Joon Ahn, Hongxin Hu, Xinwen Zhang, Jean-Pierre Seifert:
DR@FT: Efficient Remote Attestation Framework for Dynamic Systems. 182-198
Traffic Analysis
- Liming Lu, Ee-Chien Chang, Mun Choon Chan:
Website Fingerprinting and Identification Using Ordered Feature Sequences. 199-214 - Artur Janc, Lukasz Olejnik:
Web Browser History Detection as a Real-World Privacy Threat. 215-231 - Xiapu Luo, Junjie Zhang, Roberto Perdisci, Wenke Lee:
On the Secrecy of Spread-Spectrum Flow Watermarks. 232-248 - Sambuddho Chakravarty, Angelos Stavrou, Angelos D. Keromytis:
Traffic Analysis against Low-Latency Anonymity Networks Using Available Bandwidth Estimation. 249-267
End-User Security
- Guang Xiang, Bryan A. Pendleton, Jason I. Hong, Carolyn P. Rosé:
A Hierarchical Adaptive Probabilistic Approach for Zero Hour Phish Detection. 268-285 - Hristo Bojinov, Elie Bursztein, Xavier Boyen, Dan Boneh:
Kamouflage: Loss-Resistant Password Management. 286-302
Formal Analysis
- Santiago Escobar, Catherine Meadows, José Meseguer, Sonia Santiago:
Sequential Protocol Composition in Maude-NPA. 303-318 - Tien Tuan Anh Dinh, Mark Ryan:
Verifying Security Property of Peer-to-Peer Systems Using CSP. 319-339 - David A. Basin, Cas Cremers:
Modeling and Analyzing Security in the Presence of Compromising Adversaries. 340-356 - Hirotoshi Yasuoka, Tachio Terauchi:
On Bounding Problems of Quantitative Information Flow. 357-372
E-voting and Broadcast
- Sven Heiberg, Helger Lipmaa, Filip van Laenen:
On E-Vote Integrity in the Case of Malicious Voter Computers. 373-388 - Steve Kremer, Mark Ryan, Ben Smyth:
Election Verifiability in Electronic Voting Protocols. 389-404 - James Heather, Peter Y. A. Ryan, Vanessa Teague:
Pretty Good Democracy for More Expressive Voting Schemes. 405-423 - Marina Blanton, Keith B. Frikken:
Efficient Multi-dimensional Key Management in Broadcast Services. 424-440
Authentication, Access Control, Authorization and Attestation
- Jan Meier, Dieter Gollmann:
Caught in the Maze of Security Standards. 441-454 - Mikhail I. Gofman, Ruiqi Luo, Ping Yang:
User-Role Reachability Analysis of Evolving Administrative Role Based Access Control. 455-471 - Jason Crampton, Michael Huth:
An Authorization Framework Resilient to Policy Evaluation Failures. 472-487 - Alptekin Küpçü, Anna Lysyanskaya:
Optimistic Fair Exchange with Multiple Arbiters. 488-507
Anonymity and Unlinkability
- Michael Backes, Goran Doychev, Markus Dürmuth, Boris Köpf:
Speaker Recognition in Encrypted Voice Streams. 508-523 - Andreas Pashalidis, Stefan Schiffner:
Evaluating Adversarial Partitions. 524-539 - Claudio A. Ardagna, Sushil Jajodia, Pierangela Samarati, Angelos Stavrou:
Providing Mobile Users' Anonymity in Hybrid Networks. 540-557 - Ferucio Laurentiu Tiplea, Loredana Vamanu, Cosmin Vârlan:
Complexity of Anonymity for Security Protocols. 558-572
Network Security and Economics
- Lingyu Wang, Sushil Jajodia, Anoop Singhal, Steven Noel:
k-Zero Day Safety: Measuring the Security Risk of Networks against Unknown Attacks. 573-587 - Benjamin Johnson, Jens Grossklags, Nicolas Christin, John Chuang:
Are Security Experts Useful? Bayesian Nash Equilibria for Network Security Games with Limited Information. 588-606 - Michael Backes, Oana Ciobotaru, Anton Krohmer:
RatFish: A File Sharing Protocol Provably Secure against Rational Users. 607-625 - Nizar Kheir, Nora Cuppens-Boulahia, Frédéric Cuppens, Hervé Debar:
A Service Dependency Model for Cost-Sensitive Intrusion Response. 626-642
Secure Update, DOS and Intrustion Detection
- Daniele Perito, Gene Tsudik:
Secure Code Update for Embedded Devices via Proofs of Secure Erasure. 643-662 - Alexandros Kapravelos, Iasonas Polakis, Elias Athanasopoulos, Sotiris Ioannidis, Evangelos P. Markatos:
D(e|i)aling with VoIP: Robust Prevention of DIAL Attacks. 663-678 - Ghassan Karame, Srdjan Capkun:
Low-Cost Client Puzzles Based on Modular Exponentiation. 679-697 - Arnur G. Tokhtabayev, Victor A. Skormin, Andrey M. Dolgikh:
Expressive, Efficient and Obfuscation Resilient Behavior Based IDS. 698-715
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.