callback( { "result":{ "query":":facetid:toc:\"db/conf/esorics/esorics2014-1.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"403.65" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"31", "@dc":"31", "@oc":"31", "@id":"43380210", "text":":facetid:toc:db/conf/esorics/esorics2014-1.bht" } }, "hits":{ "@total":"31", "@computed":"31", "@sent":"31", "@first":"0", "hit":[{ "@score":"1", "@id":"3848120", "info":{"authors":{"author":[{"@pid":"c/XiaofengChen1","text":"Xiaofeng Chen 0001"},{"@pid":"48/1097-2","text":"Jin Li 0002"},{"@pid":"81/1232-1","text":"Jian Weng 0001"},{"@pid":"12/6604-1","text":"Jianfeng Ma 0001"},{"@pid":"73/3673","text":"Wenjing Lou"}]},"title":"Verifiable Computation over Large Database with Incremental Updates.","venue":"ESORICS","pages":"148-162","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/esorics/0001LWML14","doi":"10.1007/978-3-319-11203-9_9","ee":"https://doi.org/10.1007/978-3-319-11203-9_9","url":"https://dblp.org/rec/conf/esorics/0001LWML14"}, "url":"URL#3848120" }, { "@score":"1", "@id":"3848122", "info":{"authors":{"author":[{"@pid":"82/6843","text":"Naveed Ahmed"},{"@pid":"11/3019","text":"Christina Pöpper"},{"@pid":"51/1639","text":"Srdjan Capkun"}]},"title":"Enabling Short Fragments for Uncoordinated Spread Spectrum Communication.","venue":"ESORICS","pages":"488-507","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/esorics/AhmedPC14","doi":"10.1007/978-3-319-11203-9_28","ee":"https://doi.org/10.1007/978-3-319-11203-9_28","url":"https://dblp.org/rec/conf/esorics/AhmedPC14"}, "url":"URL#3848122" }, { "@score":"1", "@id":"3848123", "info":{"authors":{"author":[{"@pid":"137/8381","text":"Moreno Ambrosin"},{"@pid":"125/3019","text":"Christoph Busold"},{"@pid":"82/4386","text":"Mauro Conti"},{"@pid":"s/AhmadRezaSadeghi","text":"Ahmad-Reza Sadeghi"},{"@pid":"86/1764","text":"Matthias Schunter"}]},"title":"Updaticator: Updating Billions of Devices by an Efficient, Scalable and Secure Software Update Distribution over Untrusted Cache-enabled Networks.","venue":"ESORICS","pages":"76-93","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/esorics/AmbrosinBCSS14","doi":"10.1007/978-3-319-11203-9_5","ee":"https://doi.org/10.1007/978-3-319-11203-9_5","url":"https://dblp.org/rec/conf/esorics/AmbrosinBCSS14"}, "url":"URL#3848123" }, { "@score":"1", "@id":"3848126", "info":{"authors":{"author":[{"@pid":"150/4935","text":"Monir Azraoui"},{"@pid":"72/7604","text":"Kaoutar Elkhiyaoui"},{"@pid":"m/RefikMolva","text":"Refik Molva"},{"@pid":"55/4158","text":"Melek Önen"}]},"title":"StealthGuard: Proofs of Retrievability with Hidden Watchdogs.","venue":"ESORICS","pages":"239-256","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/esorics/AzraouiEMO14","doi":"10.1007/978-3-319-11203-9_14","ee":"https://doi.org/10.1007/978-3-319-11203-9_14","url":"https://dblp.org/rec/conf/esorics/AzraouiEMO14"}, "url":"URL#3848126" }, { "@score":"1", "@id":"3848140", "info":{"authors":{"author":[{"@pid":"93/3491","text":"Hua Deng"},{"@pid":"54/7015","text":"Qianhong Wu"},{"@pid":"05/4546","text":"Bo Qin"},{"@pid":"09/193","text":"Jian Mao"},{"@pid":"82/1364","text":"Xiao Liu"},{"@pid":"64/5666-9","text":"Lei Zhang 0009"},{"@pid":"74/2181","text":"Wenchang Shi"}]},"title":"Who Is Touching My Cloud.","venue":"ESORICS","pages":"362-379","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/esorics/DengWQMLZS14","doi":"10.1007/978-3-319-11203-9_21","ee":"https://doi.org/10.1007/978-3-319-11203-9_21","url":"https://dblp.org/rec/conf/esorics/DengWQMLZS14"}, "url":"URL#3848140" }, { "@score":"1", "@id":"3848142", "info":{"authors":{"author":[{"@pid":"34/5882","text":"Changyu Dong"},{"@pid":"22/150-2","text":"Liqun Chen 0002"}]},"title":"A Fast Single Server Private Information Retrieval Protocol with Low Communication Cost.","venue":"ESORICS","pages":"380-399","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/esorics/DongC14","doi":"10.1007/978-3-319-11203-9_22","ee":"https://doi.org/10.1007/978-3-319-11203-9_22","url":"https://dblp.org/rec/conf/esorics/DongC14"}, "url":"URL#3848142" }, { "@score":"1", "@id":"3848150", "info":{"authors":{"author":[{"@pid":"37/5937","text":"Dominik Herrmann"},{"@pid":"75/10010","text":"Karl-Peter Fuchs"},{"@pid":"150/4922","text":"Jens Lindemann 0001"},{"@pid":"f/HannesFederrath","text":"Hannes Federrath"}]},"title":"EncDNS: A Lightweight Privacy-Preserving Name Resolution Service.","venue":"ESORICS","pages":"37-55","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/esorics/HerrmannFLF14","doi":"10.1007/978-3-319-11203-9_3","ee":"https://doi.org/10.1007/978-3-319-11203-9_3","url":"https://dblp.org/rec/conf/esorics/HerrmannFLF14"}, "url":"URL#3848150" }, { "@score":"1", "@id":"3848157", "info":{"authors":{"author":[{"@pid":"20/2135","text":"Junzuo Lai"},{"@pid":"d/RobertHDeng","text":"Robert H. Deng"},{"@pid":"p/HweeHwaPang","text":"HweeHwa Pang"},{"@pid":"81/1232-1","text":"Jian Weng 0001"}]},"title":"Verifiable Computation on Outsourced Encrypted Data.","venue":"ESORICS","pages":"273-291","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/esorics/LaiDPW14","doi":"10.1007/978-3-319-11203-9_16","ee":"https://doi.org/10.1007/978-3-319-11203-9_16","url":"https://dblp.org/rec/conf/esorics/LaiDPW14"}, "url":"URL#3848157" }, { "@score":"1", "@id":"3848160", "info":{"authors":{"author":[{"@pid":"54/854","text":"Nektarios Leontiadis"},{"@pid":"c/NicolasChristin","text":"Nicolas Christin"}]},"title":"Empirically Measuring WHOIS Misuse.","venue":"ESORICS","pages":"19-36","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/esorics/LeontiadisC14","doi":"10.1007/978-3-319-11203-9_2","ee":"https://doi.org/10.1007/978-3-319-11203-9_2","url":"https://dblp.org/rec/conf/esorics/LeontiadisC14"}, "url":"URL#3848160" }, { "@score":"1", "@id":"3848161", "info":{"authors":{"author":[{"@pid":"82/0","text":"Min Li"},{"@pid":"150/4891","text":"Zili Zha"},{"@pid":"94/4214","text":"Wanyu Zang"},{"@pid":"13/2440-1","text":"Meng Yu 0001"},{"@pid":"21/6121-5","text":"Peng Liu 0005"},{"@pid":"56/2984","text":"Kun Bai"}]},"title":"Detangling Resource Management Functions from the TCB in Privacy-Preserving Virtualization.","venue":"ESORICS","pages":"310-325","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/esorics/LiZZYLB14","doi":"10.1007/978-3-319-11203-9_18","ee":"https://doi.org/10.1007/978-3-319-11203-9_18","url":"https://dblp.org/rec/conf/esorics/LiZZYLB14"}, "url":"URL#3848161" }, { "@score":"1", "@id":"3848162", "info":{"authors":{"author":[{"@pid":"126/6037","text":"Kaitai Liang"},{"@pid":"51/5361","text":"Joseph K. Liu"},{"@pid":"85/5606","text":"Duncan S. Wong"},{"@pid":"12/3447","text":"Willy Susilo"}]},"title":"An Efficient Cloud-Based Revocable Identity-Based Proxy Re-encryption Scheme for Public Clouds Data Sharing.","venue":"ESORICS","pages":"257-272","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/esorics/LiangLWS14","doi":"10.1007/978-3-319-11203-9_15","ee":"https://doi.org/10.1007/978-3-319-11203-9_15","url":"https://dblp.org/rec/conf/esorics/LiangLWS14"}, "url":"URL#3848162" }, { "@score":"1", "@id":"3848165", "info":{"authors":{"author":[{"@pid":"72/9727","text":"John C. Mace"},{"@pid":"98/4006","text":"Charles Morisset"},{"@pid":"45/6478","text":"Aad P. A. van Moorsel"}]},"title":"Quantitative Workflow Resiliency.","venue":"ESORICS","pages":"344-361","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/esorics/MaceMM14","doi":"10.1007/978-3-319-11203-9_20","ee":"https://doi.org/10.1007/978-3-319-11203-9_20","url":"https://dblp.org/rec/conf/esorics/MaceMM14"}, "url":"URL#3848165" }, { "@score":"1", "@id":"3848166", "info":{"authors":{"author":[{"@pid":"25/2403","text":"Pratyusa K. Manadhata"},{"@pid":"20/9081","text":"Sandeep Yadav"},{"@pid":"92/88","text":"Prasad Rao"},{"@pid":"85/4785","text":"William G. Horne"}]},"title":"Detecting Malicious Domains via Graph Inference.","venue":"ESORICS","pages":"1-18","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/esorics/ManadhataYRH14","doi":"10.1007/978-3-319-11203-9_1","ee":"https://doi.org/10.1007/978-3-319-11203-9_1","url":"https://dblp.org/rec/conf/esorics/ManadhataYRH14"}, "url":"URL#3848166" }, { "@score":"1", "@id":"3848169", "info":{"authors":{"author":[{"@pid":"16/9298","text":"Diogo Mónica"},{"@pid":"43/5391","text":"Carlos Ribeiro"}]},"title":"Local Password Validation Using Self-Organizing Maps.","venue":"ESORICS","pages":"94-111","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/esorics/MonicaR14","doi":"10.1007/978-3-319-11203-9_6","ee":"https://doi.org/10.1007/978-3-319-11203-9_6","url":"https://dblp.org/rec/conf/esorics/MonicaR14"}, "url":"URL#3848169" }, { "@score":"1", "@id":"3848173", "info":{"authors":{"author":[{"@pid":"148/1452","text":"Tran Viet Xuan Phuong"},{"@pid":"78/2235","text":"Guomin Yang"},{"@pid":"12/3447","text":"Willy Susilo"}]},"title":"Efficient Hidden Vector Encryption with Constant-Size Ciphertext.","venue":"ESORICS","pages":"472-487","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/esorics/PhuongYS14","doi":"10.1007/978-3-319-11203-9_27","ee":"https://doi.org/10.1007/978-3-319-11203-9_27","url":"https://dblp.org/rec/conf/esorics/PhuongYS14"}, "url":"URL#3848173" }, { "@score":"1", "@id":"3848175", "info":{"authors":{"author":[{"@pid":"48/8243","text":"Bertram Poettering"},{"@pid":"67/675","text":"Douglas Stebila"}]},"title":"Double-Authentication-Preventing Signatures.","venue":"ESORICS","pages":"436-453","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/esorics/PoetteringS14","doi":"10.1007/978-3-319-11203-9_25","ee":"https://doi.org/10.1007/978-3-319-11203-9_25","url":"https://dblp.org/rec/conf/esorics/PoetteringS14"}, "url":"URL#3848175" }, { "@score":"1", "@id":"3848178", "info":{"authors":{"author":[{"@pid":"57/9838","text":"Bharath Kumar Samanthula"},{"@pid":"21/3839","text":"Wei Jiang"},{"@pid":"b/ElisaBertino","text":"Elisa Bertino"}]},"title":"Privacy-Preserving Complex Query Evaluation over Semantically Secure Encrypted Data.","venue":"ESORICS","pages":"400-418","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/esorics/SamanthulaJB14","doi":"10.1007/978-3-319-11203-9_23","ee":"https://doi.org/10.1007/978-3-319-11203-9_23","url":"https://dblp.org/rec/conf/esorics/SamanthulaJB14"}, "url":"URL#3848178" }, { "@score":"1", "@id":"3848180", "info":{"authors":{"author":[{"@pid":"38/5467","text":"Jie Shi"},{"@pid":"20/2135","text":"Junzuo Lai"},{"@pid":"15/2506","text":"Yingjiu Li"},{"@pid":"d/RobertHDeng","text":"Robert H. Deng"},{"@pid":"81/1232-1","text":"Jian Weng 0001"}]},"title":"Authorized Keyword Search on Encrypted Data.","venue":"ESORICS","pages":"419-435","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/esorics/ShiLLDW14","doi":"10.1007/978-3-319-11203-9_24","ee":"https://doi.org/10.1007/978-3-319-11203-9_24","url":"https://dblp.org/rec/conf/esorics/ShiLLDW14"}, "url":"URL#3848180" }, { "@score":"1", "@id":"3848181", "info":{"authors":{"author":[{"@pid":"58/2782sb","text":"Mark Simkin 0001"},{"@pid":"52/6199","text":"Dominique Schröder"},{"@pid":"67/1543","text":"Andreas Bulling"},{"@pid":"07/5701","text":"Mario Fritz"}]},"title":"Ubic: Bridging the Gap between Digital Cryptography and the Physical World.","venue":"ESORICS","pages":"56-75","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/esorics/SimkinSBF14","doi":"10.1007/978-3-319-11203-9_4","ee":"https://doi.org/10.1007/978-3-319-11203-9_4","url":"https://dblp.org/rec/conf/esorics/SimkinSBF14"}, "url":"URL#3848181" }, { "@score":"1", "@id":"3848183", "info":{"authors":{"author":[{"@pid":"56/9730","text":"Guillermo Suarez-Tangil"},{"@pid":"82/4386","text":"Mauro Conti"},{"@pid":"98/3527","text":"Juan E. Tapiador"},{"@pid":"56/2713","text":"Pedro Peris-Lopez"}]},"title":"Detecting Targeted Smartphone Malware with Behavior-Triggering Stochastic Models.","venue":"ESORICS","pages":"183-201","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/esorics/Suarez-TangilCTP14","doi":"10.1007/978-3-319-11203-9_11","ee":"https://doi.org/10.1007/978-3-319-11203-9_11","url":"https://dblp.org/rec/conf/esorics/Suarez-TangilCTP14"}, "url":"URL#3848183" }, { "@score":"1", "@id":"3848184", "info":{"authors":{"author":[{"@pid":"93/2604-5","text":"He Sun 0005"},{"@pid":"30/3530-1","text":"Kun Sun 0001"},{"@pid":"01/3425","text":"Yuewu Wang"},{"@pid":"70/3282","text":"Jiwu Jing"},{"@pid":"j/SushilJajodia","text":"Sushil Jajodia"}]},"title":"TrustDump: Reliable Memory Acquisition on Smartphones.","venue":"ESORICS","pages":"202-218","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/esorics/SunSWJJ14","doi":"10.1007/978-3-319-11203-9_12","ee":"https://doi.org/10.1007/978-3-319-11203-9_12","url":"https://dblp.org/rec/conf/esorics/SunSWJJ14"}, "url":"URL#3848184" }, { "@score":"1", "@id":"3848187", "info":{"authors":{"author":[{"@pid":"12/5838-26","text":"Tao Wang 0026"},{"@pid":"64/424-7","text":"Yao Liu 0007"},{"@pid":"l/JayLigatti","text":"Jay Ligatti"}]},"title":"Fingerprinting Far Proximity from Radio Emissions.","venue":"ESORICS","pages":"508-525","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/esorics/WangLL14","doi":"10.1007/978-3-319-11203-9_29","ee":"https://doi.org/10.1007/978-3-319-11203-9_29","url":"https://dblp.org/rec/conf/esorics/WangLL14"}, "url":"URL#3848187" }, { "@score":"1", "@id":"3848188", "info":{"authors":{"author":[{"@pid":"w/YonggeWang","text":"Yongge Wang"},{"@pid":"147/0774","text":"Tony Nicol"}]},"title":"Statistical Properties of Pseudo Random Sequences and Experiments with PHP and Debian OpenSSL.","venue":"ESORICS","pages":"454-471","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/esorics/WangN14","doi":"10.1007/978-3-319-11203-9_26","ee":"https://doi.org/10.1007/978-3-319-11203-9_26","url":"https://dblp.org/rec/conf/esorics/WangN14"}, "url":"URL#3848188" }, { "@score":"1", "@id":"3848189", "info":{"authors":{"author":[{"@pid":"46/10271","text":"Yujue Wang"},{"@pid":"54/7015","text":"Qianhong Wu"},{"@pid":"85/5606","text":"Duncan S. Wong"},{"@pid":"05/4546","text":"Bo Qin"},{"@pid":"c/ShermanSMChow","text":"Sherman S. M. Chow"},{"@pid":"77/35-8","text":"Zhen Liu 0008"},{"@pid":"116/7143-3","text":"Xiao Tan 0003"}]},"title":"Securely Outsourcing Exponentiations with Single Untrusted Program for Cloud Storage.","venue":"ESORICS","pages":"326-343","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/esorics/WangWWQCLT14","doi":"10.1007/978-3-319-11203-9_19","ee":"https://doi.org/10.1007/978-3-319-11203-9_19","url":"https://dblp.org/rec/conf/esorics/WangWWQCLT14"}, "url":"URL#3848189" }, { "@score":"1", "@id":"3848192", "info":{"authors":{"author":[{"@pid":"21/1244","text":"Gang Xu"},{"@pid":"91/3099","text":"George T. Amariucai"},{"@pid":"04/606","text":"Yong Guan"}]},"title":"Verifiable Computation with Reduced Informational Costs and Computational Costs.","venue":"ESORICS","pages":"292-309","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/esorics/XuAG14","doi":"10.1007/978-3-319-11203-9_17","ee":"https://doi.org/10.1007/978-3-319-11203-9_17","url":"https://dblp.org/rec/conf/esorics/XuAG14"}, "url":"URL#3848192" }, { "@score":"1", "@id":"3848194", "info":{"authors":{"author":[{"@pid":"00/5867-22","text":"Chao Yang 0022"},{"@pid":"45/11343","text":"Zhaoyan Xu"},{"@pid":"64/1147","text":"Guofei Gu"},{"@pid":"75/3570","text":"Vinod Yegneswaran"},{"@pid":"48/3729","text":"Phillip A. Porras"}]},"title":"DroidMiner: Automated Mining and Characterization of Fine-grained Malicious Behaviors in Android Applications.","venue":"ESORICS","pages":"163-182","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/esorics/YangXGYP14","doi":"10.1007/978-3-319-11203-9_10","ee":"https://doi.org/10.1007/978-3-319-11203-9_10","url":"https://dblp.org/rec/conf/esorics/YangXGYP14"}, "url":"URL#3848194" }, { "@score":"1", "@id":"3848196", "info":{"authors":{"author":[{"@pid":"10/6625","text":"Tsz Hon Yuen"},{"@pid":"43/2821-1","text":"Ye Zhang 0001"},{"@pid":"y/SiuMingYiu","text":"Siu-Ming Yiu"},{"@pid":"51/5361","text":"Joseph K. Liu"}]},"title":"Identity-Based Encryption with Post-Challenge Auxiliary Inputs for Secure Cloud Applications and Sensor Networks.","venue":"ESORICS","pages":"130-147","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/esorics/YuenZYL14","doi":"10.1007/978-3-319-11203-9_8","ee":"https://doi.org/10.1007/978-3-319-11203-9_8","url":"https://dblp.org/rec/conf/esorics/YuenZYL14"}, "url":"URL#3848196" }, { "@score":"1", "@id":"3848198", "info":{"authors":{"author":[{"@pid":"16/8397","text":"Liang Feng Zhang"},{"@pid":"s/ReihanehSafaviNaini","text":"Reihaneh Safavi-Naini"}]},"title":"Verifiable Delegation of Computations with Storage-Verification Trade-off.","venue":"ESORICS","pages":"112-129","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/esorics/ZhangS14","doi":"10.1007/978-3-319-11203-9_7","ee":"https://doi.org/10.1007/978-3-319-11203-9_7","url":"https://dblp.org/rec/conf/esorics/ZhangS14"}, "url":"URL#3848198" }, { "@score":"1", "@id":"3848199", "info":{"authors":{"author":[{"@pid":"20/11242","text":"Fengwei Zhang"},{"@pid":"81/4036","text":"Haining Wang"},{"@pid":"133/3698","text":"Kevin Leach"},{"@pid":"14/5349","text":"Angelos Stavrou"}]},"title":"A Framework to Secure Peripherals at Runtime.","venue":"ESORICS","pages":"219-238","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/esorics/ZhangWLS14","doi":"10.1007/978-3-319-11203-9_13","ee":"https://doi.org/10.1007/978-3-319-11203-9_13","url":"https://dblp.org/rec/conf/esorics/ZhangWLS14"}, "url":"URL#3848199" }, { "@score":"1", "@id":"3848200", "info":{"authors":{"author":[{"@pid":"120/8325","text":"Yuexin Zhang"},{"@pid":"50/2192-1","text":"Yang Xiang 0001"},{"@pid":"82/4944-1","text":"Xinyi Huang 0001"},{"@pid":"85/2168-2","text":"Li Xu 0002"}]},"title":"A Cross-Layer Key Establishment Scheme in Wireless Mesh Networks.","venue":"ESORICS","pages":"526-541","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/esorics/ZhangXHX14","doi":"10.1007/978-3-319-11203-9_30","ee":"https://doi.org/10.1007/978-3-319-11203-9_30","url":"https://dblp.org/rec/conf/esorics/ZhangXHX14"}, "url":"URL#3848200" }, { "@score":"1", "@id":"3961898", "info":{"authors":{"author":[{"@pid":"09/3690","text":"Miroslaw Kutylowski"},{"@pid":"61/3091","text":"Jaideep Vaidya"}]},"title":"Computer Security - ESORICS 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part I","venue":["ESORICS","Lecture Notes in Computer Science"],"volume":"8712","publisher":"Springer","year":"2014","type":"Editorship","key":"conf/esorics/2014-1","doi":"10.1007/978-3-319-11203-9","ee":"https://doi.org/10.1007/978-3-319-11203-9","url":"https://dblp.org/rec/conf/esorics/2014-1"}, "url":"URL#3961898" } ] } } } )