Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/esorics/esorics2014-2.bht:"
@inproceedings{DBLP:conf/esorics/AumassonJN14, author = {Jean{-}Philippe Aumasson and Philipp Jovanovic and Samuel Neves}, editor = {Miroslaw Kutylowski and Jaideep Vaidya}, title = {{NORX:} Parallel and Scalable {AEAD}}, booktitle = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8713}, pages = {19--36}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11212-1\_2}, doi = {10.1007/978-3-319-11212-1\_2}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/AumassonJN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/BaluFG14, author = {Raghavendran Balu and Teddy Furon and S{\'{e}}bastien Gambs}, editor = {Miroslaw Kutylowski and Jaideep Vaidya}, title = {Challenging Differential Privacy: The Case of Non-interactive Mechanisms}, booktitle = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8713}, pages = {146--164}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11212-1\_9}, doi = {10.1007/978-3-319-11212-1\_9}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/BaluFG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/BilogrevicFCU14, author = {Igor Bilogrevic and Julien Freudiger and Emiliano De Cristofaro and Ersin Uzun}, editor = {Miroslaw Kutylowski and Jaideep Vaidya}, title = {What's the Gist? Privacy-Preserving Aggregation of User Profiles}, booktitle = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8713}, pages = {128--145}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11212-1\_8}, doi = {10.1007/978-3-319-11212-1\_8}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/BilogrevicFCU14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/BiskupBGS14, author = {Joachim Biskup and Piero A. Bonatti and Clemente Galdi and Luigi Sauro}, editor = {Miroslaw Kutylowski and Jaideep Vaidya}, title = {Optimality and Complexity of Inference-Proof Data Filtering and {CQE}}, booktitle = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8713}, pages = {165--181}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11212-1\_10}, doi = {10.1007/978-3-319-11212-1\_10}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/BiskupBGS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/CamenischLNR14, author = {Jan Camenisch and Anja Lehmann and Gregory Neven and Alfredo Rial}, editor = {Miroslaw Kutylowski and Jaideep Vaidya}, title = {Privacy-Preserving Auditing for Attribute-Based Credentials}, booktitle = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8713}, pages = {109--127}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11212-1\_7}, doi = {10.1007/978-3-319-11212-1\_7}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/CamenischLNR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/ChothiaKN14, author = {Tom Chothia and Yusuke Kawamoto and Chris Novakovic}, editor = {Miroslaw Kutylowski and Jaideep Vaidya}, title = {LeakWatch: Estimating Information Leakage from Java Programs}, booktitle = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8713}, pages = {219--236}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11212-1\_13}, doi = {10.1007/978-3-319-11212-1\_13}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/ChothiaKN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/CortierGGI14, author = {V{\'{e}}ronique Cortier and David Galindo and St{\'{e}}phane Glondu and Malika Izabach{\`{e}}ne}, editor = {Miroslaw Kutylowski and Jaideep Vaidya}, title = {Election Verifiability for Helios under Weaker Trust Assumptions}, booktitle = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8713}, pages = {327--344}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11212-1\_19}, doi = {10.1007/978-3-319-11212-1\_19}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/CortierGGI14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/DeckerW14, author = {Christian Decker and Roger Wattenhofer}, editor = {Miroslaw Kutylowski and Jaideep Vaidya}, title = {Bitcoin Transaction Malleability and MtGox}, booktitle = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8713}, pages = {313--326}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11212-1\_18}, doi = {10.1007/978-3-319-11212-1\_18}, timestamp = {Wed, 12 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/DeckerW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/GatesLXCMP14, author = {Christopher S. Gates and Ninghui Li and Zenglin Xu and Suresh N. Chari and Ian M. Molloy and Youngja Park}, editor = {Miroslaw Kutylowski and Jaideep Vaidya}, title = {Detecting Insider Information Theft Using Features from File Access Logs}, booktitle = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8713}, pages = {383--400}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11212-1\_22}, doi = {10.1007/978-3-319-11212-1\_22}, timestamp = {Wed, 02 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/GatesLXCMP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/HanSMZA14, author = {Jinguang Han and Willy Susilo and Yi Mu and Jianying Zhou and Man Ho Au}, editor = {Miroslaw Kutylowski and Jaideep Vaidya}, title = {{PPDCP-ABE:} Privacy-Preserving Decentralized Ciphertext-Policy Attribute-Based Encryption}, booktitle = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8713}, pages = {73--90}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11212-1\_5}, doi = {10.1007/978-3-319-11212-1\_5}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/HanSMZA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/KieferM14, author = {Franziskus Kiefer and Mark Manulis}, editor = {Miroslaw Kutylowski and Jaideep Vaidya}, title = {Zero-Knowledge Password Policy Checks and Verifier-Based {PAKE}}, booktitle = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8713}, pages = {295--312}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11212-1\_17}, doi = {10.1007/978-3-319-11212-1\_17}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/KieferM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/LalandeHB14, author = {Jean{-}Fran{\c{c}}ois Lalande and Karine Heydemann and Pascal Berthom{\'{e}}}, editor = {Miroslaw Kutylowski and Jaideep Vaidya}, title = {Software Countermeasures for Control Flow Integrity of Smart Card {C} Codes}, booktitle = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8713}, pages = {200--218}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11212-1\_12}, doi = {10.1007/978-3-319-11212-1\_12}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/LalandeHB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/LeeKLP14, author = {Kwangsu Lee and Woo Kwon Koo and Dong Hoon Lee and Jong Hwan Park}, editor = {Miroslaw Kutylowski and Jaideep Vaidya}, title = {Public-Key Revocation and Tracing Schemes with Subset Difference Methods Revisited}, booktitle = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8713}, pages = {1--18}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11212-1\_1}, doi = {10.1007/978-3-319-11212-1\_1}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/LeeKLP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/LiuAHSZY14, author = {Joseph K. Liu and Man Ho Au and Xinyi Huang and Willy Susilo and Jianying Zhou and Yong Yu}, editor = {Miroslaw Kutylowski and Jaideep Vaidya}, title = {New Insight to Preserve Online Survey Accuracy and Privacy in Big Data Era}, booktitle = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8713}, pages = {182--199}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11212-1\_11}, doi = {10.1007/978-3-319-11212-1\_11}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/LiuAHSZY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/LiuLWQZ14, author = {Weiran Liu and Jianwei Liu and Qianhong Wu and Bo Qin and Yunya Zhou}, editor = {Miroslaw Kutylowski and Jaideep Vaidya}, title = {Practical Direct Chosen Ciphertext Secure Key-Policy Attribute-Based Encryption with Public Ciphertext Test}, booktitle = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8713}, pages = {91--108}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11212-1\_6}, doi = {10.1007/978-3-319-11212-1\_6}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/LiuLWQZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/MarsonP14, author = {Giorgia Azzurra Marson and Bertram Poettering}, editor = {Miroslaw Kutylowski and Jaideep Vaidya}, title = {Even More Practical Secure Logging: Tree-Based Seekable Sequential Key Generators}, booktitle = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8713}, pages = {37--54}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11212-1\_3}, doi = {10.1007/978-3-319-11212-1\_3}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/MarsonP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/MinV14, author = {Byungho Min and Vijay Varadharajan}, editor = {Miroslaw Kutylowski and Jaideep Vaidya}, title = {Feature-Distributed Malware Attack: Risk and Defence}, booktitle = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8713}, pages = {457--474}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11212-1\_26}, doi = {10.1007/978-3-319-11212-1\_26}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/MinV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/Nagaraja14, author = {Shishir Nagaraja}, editor = {Miroslaw Kutylowski and Jaideep Vaidya}, title = {Botyacc: Unified {P2P} Botnet Detection Using Behavioural Analysis and Graph Analysis}, booktitle = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8713}, pages = {439--456}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11212-1\_25}, doi = {10.1007/978-3-319-11212-1\_25}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/Nagaraja14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/NingCDWL14, author = {Jianting Ning and Zhenfu Cao and Xiaolei Dong and Lifei Wei and Xiaodong Lin}, editor = {Miroslaw Kutylowski and Jaideep Vaidya}, title = {Large Universe Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability}, booktitle = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8713}, pages = {55--72}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11212-1\_4}, doi = {10.1007/978-3-319-11212-1\_4}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/NingCDWL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/RuffingMK14, author = {Tim Ruffing and Pedro Moreno{-}Sanchez and Aniket Kate}, editor = {Miroslaw Kutylowski and Jaideep Vaidya}, title = {CoinShuffle: Practical Decentralized Coin Mixing for Bitcoin}, booktitle = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8713}, pages = {345--364}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11212-1\_20}, doi = {10.1007/978-3-319-11212-1\_20}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/RuffingMK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/Schwenk14, author = {J{\"{o}}rg Schwenk}, editor = {Miroslaw Kutylowski and Jaideep Vaidya}, title = {Modelling Time for Authenticated Key Exchange Protocols}, booktitle = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8713}, pages = {277--294}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11212-1\_16}, doi = {10.1007/978-3-319-11212-1\_16}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/Schwenk14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/SonchackA14, author = {John Sonchack and Adam J. Aviv}, editor = {Miroslaw Kutylowski and Jaideep Vaidya}, title = {{LESS} Is More: Host-Agent Based Simulator for Large-Scale Evaluation of Security Systems}, booktitle = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8713}, pages = {365--382}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11212-1\_21}, doi = {10.1007/978-3-319-11212-1\_21}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/SonchackA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/UrbinaGCL14, author = {David I. Urbina and Yufei Gu and Juan Caballero and Zhiqiang Lin}, editor = {Miroslaw Kutylowski and Jaideep Vaidya}, title = {SigPath: {A} Memory Graph Based Approach for Program Data Introspection and Modification}, booktitle = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8713}, pages = {237--256}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11212-1\_14}, doi = {10.1007/978-3-319-11212-1\_14}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/UrbinaGCL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/WangXZXWG14, author = {Yong Wang and Zhaoyan Xu and Jialong Zhang and Lei Xu and Haopei Wang and Guofei Gu}, editor = {Miroslaw Kutylowski and Jaideep Vaidya}, title = {{SRID:} State Relation Based Intrusion Detection for False Data Injection Attacks in {SCADA}}, booktitle = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8713}, pages = {401--418}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11212-1\_23}, doi = {10.1007/978-3-319-11212-1\_23}, timestamp = {Mon, 14 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/WangXZXWG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/WangZJSA14, author = {Lingyu Wang and Mengyuan Zhang and Sushil Jajodia and Anoop Singhal and Massimiliano Albanese}, editor = {Miroslaw Kutylowski and Jaideep Vaidya}, title = {Modeling Network Diversity for Evaluating the Robustness of Networks against Zero-Day Attacks}, booktitle = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8713}, pages = {494--511}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11212-1\_28}, doi = {10.1007/978-3-319-11212-1\_28}, timestamp = {Wed, 01 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/WangZJSA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/XuLKWS14, author = {Haitao Xu and Daiping Liu and Aaron Koehl and Haining Wang and Angelos Stavrou}, editor = {Miroslaw Kutylowski and Jaideep Vaidya}, title = {Click Fraud Detection on the Advertiser Side}, booktitle = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8713}, pages = {419--438}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11212-1\_24}, doi = {10.1007/978-3-319-11212-1\_24}, timestamp = {Thu, 09 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/XuLKWS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/YiHB14, author = {Xun Yi and Feng Hao and Elisa Bertino}, editor = {Miroslaw Kutylowski and Jaideep Vaidya}, title = {ID-Based Two-Server Password-Authenticated Key Exchange}, booktitle = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8713}, pages = {257--276}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11212-1\_15}, doi = {10.1007/978-3-319-11212-1\_15}, timestamp = {Mon, 12 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/YiHB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/ZhangS0J14, author = {Lingchen Zhang and Sachin Shetty and Peng Liu and Jiwu Jing}, editor = {Miroslaw Kutylowski and Jaideep Vaidya}, title = {RootkitDet: Practical End-to-End Defense against Kernel Rootkits in a Cloud Environment}, booktitle = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8713}, pages = {475--493}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11212-1\_27}, doi = {10.1007/978-3-319-11212-1\_27}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/ZhangS0J14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esorics/2014-2, editor = {Miroslaw Kutylowski and Jaideep Vaidya}, title = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8713}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11212-1}, doi = {10.1007/978-3-319-11212-1}, isbn = {978-3-319-11211-4}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/2014-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.