default search action
20th ESORICS 2015: Vienna, Austria
- Günther Pernul, Peter Y. A. Ryan, Edgar R. Weippl:
Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I. Lecture Notes in Computer Science 9326, Springer 2015, ISBN 978-3-319-24173-9
Networks and Web Security
- Haya Schulmann, Michael Waidner:
Towards Security of Internet Naming Infrastructure. 3-22 - Mario Heiderich, Marcus Niemietz, Jörg Schwenk:
Waiting for CSP - Securing Legacy Web Applications with JSAgents. 23-42 - Daniel Fett, Ralf Küsters, Guido Schmitz:
Analyzing the BrowserID SSO System with Primary Identity Providers Using an Expressive Model of the Web. 43-65
System Security
- Ping Chen, Jun Xu, Zhiqiang Lin, Dongyan Xu, Bing Mao, Peng Liu:
A Practical Approach for Adaptive Data Structure Layout Randomization. 69-89 - Hind Chfouka, Hamed Nemati, Roberto Guanciale, Mads Dam, Patrik Ekdahl:
Trustworthy Prevention of Code Injection in Linux on Embedded Devices. 90-107 - Daniel Gruss, David Bidner, Stefan Mangard:
Practical Memory Deduplication Attacks in Sandboxed Javascript. 108-122
Cryptography
- Michael Backes, Esfandiar Mohammadi, Tim Ruffing:
Computational Soundness for Interactive Primitives. 125-145 - Christian Hanser, Max Rabkin, Dominique Schröder:
Verifiably Encrypted Signatures: Security Revisited and a New Construction. 146-164 - Gildas Avoine, Xavier Carpent, Cédric Lauradoux:
Interleaving Cryptanalytic Time-Memory Trade-Offs on Non-uniform Distributions. 165-184 - Kazuhiko Minematsu:
Efficient Message Authentication Codes with Combinatorial Group Testing. 185-202 - Chaowen Guan, Kui Ren, Fangguo Zhang, Florian Kerschbaum, Jia Yu:
Symmetric-Key Based Proofs of Retrievability Supporting Public Verification. 203-223 - Oscar García Morchon, Ronald Rietman, Sahil Sharma, Ludo Tolhuizen, Jose Luis Torre-Arce:
DTLS-HIMMO: Achieving DTLS Certificate Security with Symmetric Key Overhead. 224-242 - Jonathan Bootle, Andrea Cerulli, Pyrros Chaidos, Essam Ghadafi, Jens Groth, Christophe Petit:
Short Accountable Ring Signatures Based on DDH. 243-265 - Rupeng Yang, Qiuliang Xu, Yongbin Zhou, Rui Zhang, Chengyu Hu, Zuoxia Yu:
Updatable Hash Proof System and Its Applications. 266-285 - Baodong Qin, Robert H. Deng, Yingjiu Li, Shengli Liu:
Server-Aided Revocable Identity-Based Encryption. 286-304 - Fabrice Benhamouda, Stephan Krenn, Vadim Lyubashevsky, Krzysztof Pietrzak:
Efficient Zero-Knowledge Proofs for Commitments from Learning with Errors over Rings. 305-325 - Aggelos Kiayias, Qiang Tang:
Making Any Identity-Based Encryption Accountable, Efficiently. 326-346 - Xun Yi, Feng Hao, Liqun Chen, Joseph K. Liu:
Practical Threshold Password-Authenticated Secret Sharing Protocol. 347-365 - Swee-Won Lo, Zhuo Wei, Robert H. Deng, Xuhua Ding:
On Security of Content-Based Video Stream Authentication. 366-383 - Marina Blanton, Siddharth Saraph:
Oblivious Maximum Bipartite Matching Size Algorithm with Applications to Secure Fingerprint Identification. 384-406 - Tibor Jager, Jörg Schwenk, Juraj Somorovsky:
Practical Invalid Curve Attacks on TLS-ECDH. 407-425
Crypto Applications and Attacks
- Alessandro Barenghi, Alessandro Di Federico, Gerardo Pelosi, Stefano Sanfilippo:
Challenging the Trustworthiness of PGP: Is the Web-of-Trust Tear-Proof? 429-446 - Heiko Mantel, Artem Starostin:
Transforming Out Timing Leaks, More or Less. 447-467 - Junrong Liu, Yu Yu, François-Xavier Standaert, Zheng Guo, Dawu Gu, Wei Sun, Yijie Ge, Xinjun Xie:
Small Tweaks Do Not Help: Differential Power Analysis of MILENAGE Implementations in 3G/4G USIM Cards. 468-480
Risk Analysis
- Aron Laszka, Jens Grossklags:
Should Cyber-Insurance Providers Invest in Software Security? 483-502 - Jan Tobias Mühlberg, Job Noorman, Frank Piessens:
Lightweight and Flexible Trust Assessment Modules for the Internet of Things. 503-520 - Paul Beaumont, Neil Evans, Michael Huth, Tom Plant:
Confidence Analysis for Nuclear Arms Control: SMT Abstractions of Bayesian Belief Networks. 521-540
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.