Search dblp for Publications

export results for "toc:db/conf/esorics/esorics2014-2.bht:"

 download as .bib file

@inproceedings{DBLP:conf/esorics/AumassonJN14,
  author       = {Jean{-}Philippe Aumasson and
                  Philipp Jovanovic and
                  Samuel Neves},
  editor       = {Miroslaw Kutylowski and
                  Jaideep Vaidya},
  title        = {{NORX:} Parallel and Scalable {AEAD}},
  booktitle    = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research
                  in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8713},
  pages        = {19--36},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11212-1\_2},
  doi          = {10.1007/978-3-319-11212-1\_2},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/AumassonJN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/BaluFG14,
  author       = {Raghavendran Balu and
                  Teddy Furon and
                  S{\'{e}}bastien Gambs},
  editor       = {Miroslaw Kutylowski and
                  Jaideep Vaidya},
  title        = {Challenging Differential Privacy: The Case of Non-interactive Mechanisms},
  booktitle    = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research
                  in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8713},
  pages        = {146--164},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11212-1\_9},
  doi          = {10.1007/978-3-319-11212-1\_9},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/BaluFG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/BilogrevicFCU14,
  author       = {Igor Bilogrevic and
                  Julien Freudiger and
                  Emiliano De Cristofaro and
                  Ersin Uzun},
  editor       = {Miroslaw Kutylowski and
                  Jaideep Vaidya},
  title        = {What's the Gist? Privacy-Preserving Aggregation of User Profiles},
  booktitle    = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research
                  in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8713},
  pages        = {128--145},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11212-1\_8},
  doi          = {10.1007/978-3-319-11212-1\_8},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/BilogrevicFCU14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/BiskupBGS14,
  author       = {Joachim Biskup and
                  Piero A. Bonatti and
                  Clemente Galdi and
                  Luigi Sauro},
  editor       = {Miroslaw Kutylowski and
                  Jaideep Vaidya},
  title        = {Optimality and Complexity of Inference-Proof Data Filtering and {CQE}},
  booktitle    = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research
                  in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8713},
  pages        = {165--181},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11212-1\_10},
  doi          = {10.1007/978-3-319-11212-1\_10},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/BiskupBGS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/CamenischLNR14,
  author       = {Jan Camenisch and
                  Anja Lehmann and
                  Gregory Neven and
                  Alfredo Rial},
  editor       = {Miroslaw Kutylowski and
                  Jaideep Vaidya},
  title        = {Privacy-Preserving Auditing for Attribute-Based Credentials},
  booktitle    = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research
                  in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8713},
  pages        = {109--127},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11212-1\_7},
  doi          = {10.1007/978-3-319-11212-1\_7},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/CamenischLNR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/ChothiaKN14,
  author       = {Tom Chothia and
                  Yusuke Kawamoto and
                  Chris Novakovic},
  editor       = {Miroslaw Kutylowski and
                  Jaideep Vaidya},
  title        = {LeakWatch: Estimating Information Leakage from Java Programs},
  booktitle    = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research
                  in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8713},
  pages        = {219--236},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11212-1\_13},
  doi          = {10.1007/978-3-319-11212-1\_13},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/ChothiaKN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/CortierGGI14,
  author       = {V{\'{e}}ronique Cortier and
                  David Galindo and
                  St{\'{e}}phane Glondu and
                  Malika Izabach{\`{e}}ne},
  editor       = {Miroslaw Kutylowski and
                  Jaideep Vaidya},
  title        = {Election Verifiability for Helios under Weaker Trust Assumptions},
  booktitle    = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research
                  in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8713},
  pages        = {327--344},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11212-1\_19},
  doi          = {10.1007/978-3-319-11212-1\_19},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/CortierGGI14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/DeckerW14,
  author       = {Christian Decker and
                  Roger Wattenhofer},
  editor       = {Miroslaw Kutylowski and
                  Jaideep Vaidya},
  title        = {Bitcoin Transaction Malleability and MtGox},
  booktitle    = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research
                  in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8713},
  pages        = {313--326},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11212-1\_18},
  doi          = {10.1007/978-3-319-11212-1\_18},
  timestamp    = {Wed, 12 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/DeckerW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/GatesLXCMP14,
  author       = {Christopher S. Gates and
                  Ninghui Li and
                  Zenglin Xu and
                  Suresh N. Chari and
                  Ian M. Molloy and
                  Youngja Park},
  editor       = {Miroslaw Kutylowski and
                  Jaideep Vaidya},
  title        = {Detecting Insider Information Theft Using Features from File Access
                  Logs},
  booktitle    = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research
                  in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8713},
  pages        = {383--400},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11212-1\_22},
  doi          = {10.1007/978-3-319-11212-1\_22},
  timestamp    = {Wed, 02 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/GatesLXCMP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/HanSMZA14,
  author       = {Jinguang Han and
                  Willy Susilo and
                  Yi Mu and
                  Jianying Zhou and
                  Man Ho Au},
  editor       = {Miroslaw Kutylowski and
                  Jaideep Vaidya},
  title        = {{PPDCP-ABE:} Privacy-Preserving Decentralized Ciphertext-Policy Attribute-Based
                  Encryption},
  booktitle    = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research
                  in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8713},
  pages        = {73--90},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11212-1\_5},
  doi          = {10.1007/978-3-319-11212-1\_5},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/HanSMZA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/KieferM14,
  author       = {Franziskus Kiefer and
                  Mark Manulis},
  editor       = {Miroslaw Kutylowski and
                  Jaideep Vaidya},
  title        = {Zero-Knowledge Password Policy Checks and Verifier-Based {PAKE}},
  booktitle    = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research
                  in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8713},
  pages        = {295--312},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11212-1\_17},
  doi          = {10.1007/978-3-319-11212-1\_17},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/KieferM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/LalandeHB14,
  author       = {Jean{-}Fran{\c{c}}ois Lalande and
                  Karine Heydemann and
                  Pascal Berthom{\'{e}}},
  editor       = {Miroslaw Kutylowski and
                  Jaideep Vaidya},
  title        = {Software Countermeasures for Control Flow Integrity of Smart Card
                  {C} Codes},
  booktitle    = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research
                  in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8713},
  pages        = {200--218},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11212-1\_12},
  doi          = {10.1007/978-3-319-11212-1\_12},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/LalandeHB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/LeeKLP14,
  author       = {Kwangsu Lee and
                  Woo Kwon Koo and
                  Dong Hoon Lee and
                  Jong Hwan Park},
  editor       = {Miroslaw Kutylowski and
                  Jaideep Vaidya},
  title        = {Public-Key Revocation and Tracing Schemes with Subset Difference Methods
                  Revisited},
  booktitle    = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research
                  in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8713},
  pages        = {1--18},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11212-1\_1},
  doi          = {10.1007/978-3-319-11212-1\_1},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/LeeKLP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/LiuAHSZY14,
  author       = {Joseph K. Liu and
                  Man Ho Au and
                  Xinyi Huang and
                  Willy Susilo and
                  Jianying Zhou and
                  Yong Yu},
  editor       = {Miroslaw Kutylowski and
                  Jaideep Vaidya},
  title        = {New Insight to Preserve Online Survey Accuracy and Privacy in Big
                  Data Era},
  booktitle    = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research
                  in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8713},
  pages        = {182--199},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11212-1\_11},
  doi          = {10.1007/978-3-319-11212-1\_11},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/LiuAHSZY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/LiuLWQZ14,
  author       = {Weiran Liu and
                  Jianwei Liu and
                  Qianhong Wu and
                  Bo Qin and
                  Yunya Zhou},
  editor       = {Miroslaw Kutylowski and
                  Jaideep Vaidya},
  title        = {Practical Direct Chosen Ciphertext Secure Key-Policy Attribute-Based
                  Encryption with Public Ciphertext Test},
  booktitle    = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research
                  in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8713},
  pages        = {91--108},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11212-1\_6},
  doi          = {10.1007/978-3-319-11212-1\_6},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/LiuLWQZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/MarsonP14,
  author       = {Giorgia Azzurra Marson and
                  Bertram Poettering},
  editor       = {Miroslaw Kutylowski and
                  Jaideep Vaidya},
  title        = {Even More Practical Secure Logging: Tree-Based Seekable Sequential
                  Key Generators},
  booktitle    = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research
                  in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8713},
  pages        = {37--54},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11212-1\_3},
  doi          = {10.1007/978-3-319-11212-1\_3},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/MarsonP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/MinV14,
  author       = {Byungho Min and
                  Vijay Varadharajan},
  editor       = {Miroslaw Kutylowski and
                  Jaideep Vaidya},
  title        = {Feature-Distributed Malware Attack: Risk and Defence},
  booktitle    = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research
                  in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8713},
  pages        = {457--474},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11212-1\_26},
  doi          = {10.1007/978-3-319-11212-1\_26},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/MinV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/Nagaraja14,
  author       = {Shishir Nagaraja},
  editor       = {Miroslaw Kutylowski and
                  Jaideep Vaidya},
  title        = {Botyacc: Unified {P2P} Botnet Detection Using Behavioural Analysis
                  and Graph Analysis},
  booktitle    = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research
                  in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8713},
  pages        = {439--456},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11212-1\_25},
  doi          = {10.1007/978-3-319-11212-1\_25},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/Nagaraja14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/NingCDWL14,
  author       = {Jianting Ning and
                  Zhenfu Cao and
                  Xiaolei Dong and
                  Lifei Wei and
                  Xiaodong Lin},
  editor       = {Miroslaw Kutylowski and
                  Jaideep Vaidya},
  title        = {Large Universe Ciphertext-Policy Attribute-Based Encryption with White-Box
                  Traceability},
  booktitle    = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research
                  in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8713},
  pages        = {55--72},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11212-1\_4},
  doi          = {10.1007/978-3-319-11212-1\_4},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/NingCDWL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/RuffingMK14,
  author       = {Tim Ruffing and
                  Pedro Moreno{-}Sanchez and
                  Aniket Kate},
  editor       = {Miroslaw Kutylowski and
                  Jaideep Vaidya},
  title        = {CoinShuffle: Practical Decentralized Coin Mixing for Bitcoin},
  booktitle    = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research
                  in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8713},
  pages        = {345--364},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11212-1\_20},
  doi          = {10.1007/978-3-319-11212-1\_20},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/RuffingMK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/Schwenk14,
  author       = {J{\"{o}}rg Schwenk},
  editor       = {Miroslaw Kutylowski and
                  Jaideep Vaidya},
  title        = {Modelling Time for Authenticated Key Exchange Protocols},
  booktitle    = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research
                  in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8713},
  pages        = {277--294},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11212-1\_16},
  doi          = {10.1007/978-3-319-11212-1\_16},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/Schwenk14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/SonchackA14,
  author       = {John Sonchack and
                  Adam J. Aviv},
  editor       = {Miroslaw Kutylowski and
                  Jaideep Vaidya},
  title        = {{LESS} Is More: Host-Agent Based Simulator for Large-Scale Evaluation
                  of Security Systems},
  booktitle    = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research
                  in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8713},
  pages        = {365--382},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11212-1\_21},
  doi          = {10.1007/978-3-319-11212-1\_21},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/SonchackA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/UrbinaGCL14,
  author       = {David I. Urbina and
                  Yufei Gu and
                  Juan Caballero and
                  Zhiqiang Lin},
  editor       = {Miroslaw Kutylowski and
                  Jaideep Vaidya},
  title        = {SigPath: {A} Memory Graph Based Approach for Program Data Introspection
                  and Modification},
  booktitle    = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research
                  in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8713},
  pages        = {237--256},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11212-1\_14},
  doi          = {10.1007/978-3-319-11212-1\_14},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/UrbinaGCL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/WangXZXWG14,
  author       = {Yong Wang and
                  Zhaoyan Xu and
                  Jialong Zhang and
                  Lei Xu and
                  Haopei Wang and
                  Guofei Gu},
  editor       = {Miroslaw Kutylowski and
                  Jaideep Vaidya},
  title        = {{SRID:} State Relation Based Intrusion Detection for False Data Injection
                  Attacks in {SCADA}},
  booktitle    = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research
                  in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8713},
  pages        = {401--418},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11212-1\_23},
  doi          = {10.1007/978-3-319-11212-1\_23},
  timestamp    = {Mon, 14 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/WangXZXWG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/WangZJSA14,
  author       = {Lingyu Wang and
                  Mengyuan Zhang and
                  Sushil Jajodia and
                  Anoop Singhal and
                  Massimiliano Albanese},
  editor       = {Miroslaw Kutylowski and
                  Jaideep Vaidya},
  title        = {Modeling Network Diversity for Evaluating the Robustness of Networks
                  against Zero-Day Attacks},
  booktitle    = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research
                  in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8713},
  pages        = {494--511},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11212-1\_28},
  doi          = {10.1007/978-3-319-11212-1\_28},
  timestamp    = {Wed, 01 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/WangZJSA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/XuLKWS14,
  author       = {Haitao Xu and
                  Daiping Liu and
                  Aaron Koehl and
                  Haining Wang and
                  Angelos Stavrou},
  editor       = {Miroslaw Kutylowski and
                  Jaideep Vaidya},
  title        = {Click Fraud Detection on the Advertiser Side},
  booktitle    = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research
                  in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8713},
  pages        = {419--438},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11212-1\_24},
  doi          = {10.1007/978-3-319-11212-1\_24},
  timestamp    = {Thu, 09 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/XuLKWS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/YiHB14,
  author       = {Xun Yi and
                  Feng Hao and
                  Elisa Bertino},
  editor       = {Miroslaw Kutylowski and
                  Jaideep Vaidya},
  title        = {ID-Based Two-Server Password-Authenticated Key Exchange},
  booktitle    = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research
                  in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8713},
  pages        = {257--276},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11212-1\_15},
  doi          = {10.1007/978-3-319-11212-1\_15},
  timestamp    = {Mon, 12 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/YiHB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/ZhangS0J14,
  author       = {Lingchen Zhang and
                  Sachin Shetty and
                  Peng Liu and
                  Jiwu Jing},
  editor       = {Miroslaw Kutylowski and
                  Jaideep Vaidya},
  title        = {RootkitDet: Practical End-to-End Defense against Kernel Rootkits in
                  a Cloud Environment},
  booktitle    = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research
                  in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8713},
  pages        = {475--493},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11212-1\_27},
  doi          = {10.1007/978-3-319-11212-1\_27},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/ZhangS0J14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2014-2,
  editor       = {Miroslaw Kutylowski and
                  Jaideep Vaidya},
  title        = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research
                  in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8713},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11212-1},
  doi          = {10.1007/978-3-319-11212-1},
  isbn         = {978-3-319-11211-4},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/2014-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics